Vulnerability Description
Before version 4.8.2, WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | 3.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/100912Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039553
- https://core.trac.wordpress.org/changeset/41457PatchVendor Advisory
- https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-relePatchRelease NotesVendor Advisory
- https://wpvulndb.com/vulnerabilities/8911Third Party Advisory
- https://www.debian.org/security/2017/dsa-3997
- http://www.securityfocus.com/bid/100912Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039553
- https://core.trac.wordpress.org/changeset/41457PatchVendor Advisory
- https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-relePatchRelease NotesVendor Advisory
- https://wpvulndb.com/vulnerabilities/8911Third Party Advisory
- https://www.debian.org/security/2017/dsa-3997
FAQ
What is CVE-2017-14719?
CVE-2017-14719 is a vulnerability with a CVSS score of 7.5 (HIGH). Before version 4.8.2, WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components.
How severe is CVE-2017-14719?
CVE-2017-14719 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14719?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.