MEDIUM · 6.6

CVE-2022-21663

WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening un...

Vulnerability Description

WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.

CVSS Score

6.6

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
WordpressWordpress< 5.8.3
DebianDebian Linux9.0
FedoraprojectFedora34

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-21663?

CVE-2022-21663 is a vulnerability with a CVSS score of 6.6 (MEDIUM). WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening un...

How severe is CVE-2022-21663?

CVE-2022-21663 has been rated MEDIUM with a CVSS base score of 6.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-21663?

Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress, Debian Debian Linux, Fedoraproject Fedora.