Vulnerability Description
WordPress before 4.5.3 allows remote attackers to bypass the sanitize_file_name protection mechanism via unspecified vectors.
CVSS Score
7.5
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | <= 4.5.2 |
References
- http://www.debian.org/security/2016/dsa-3639
- http://www.securityfocus.com/bid/91364
- http://www.securitytracker.com/id/1036163Third Party Advisory
- https://codex.wordpress.org/Version_4.5.3
- https://wordpress.org/news/2016/06/wordpress-4-5-3/Vendor Advisory
- http://www.debian.org/security/2016/dsa-3639
- http://www.securityfocus.com/bid/91364
- http://www.securitytracker.com/id/1036163Third Party Advisory
- https://codex.wordpress.org/Version_4.5.3
- https://wordpress.org/news/2016/06/wordpress-4-5-3/Vendor Advisory
FAQ
What is CVE-2016-5839?
CVE-2016-5839 is a vulnerability with a CVSS score of 7.5 (HIGH). WordPress before 4.5.3 allows remote attackers to bypass the sanitize_file_name protection mechanism via unspecified vectors.
How severe is CVE-2016-5839?
CVE-2016-5839 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-5839?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.