Vulnerability Description
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | < 5.8.3 |
| Debian | Debian Linux | 9.0 |
| Fedoraproject | Fedora | 34 |
Related Weaknesses (CWE)
References
- https://blog.sonarsource.com/wordpress-object-injection-vulnerability/ExploitThird Party Advisory
- https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-jmmq-m8pThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/01/msg00019.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/Release NotesVendor Advisory
- https://www.debian.org/security/2022/dsa-5039Third Party Advisory
- https://blog.sonarsource.com/wordpress-object-injection-vulnerability/ExploitThird Party Advisory
- https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-jmmq-m8pThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/01/msg00019.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/Release NotesVendor Advisory
- https://www.debian.org/security/2022/dsa-5039Third Party Advisory
FAQ
What is CVE-2022-21663?
CVE-2022-21663 is a vulnerability with a CVSS score of 6.6 (MEDIUM). WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening un...
How severe is CVE-2022-21663?
CVE-2022-21663 has been rated MEDIUM with a CVSS base score of 6.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-21663?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress, Debian Debian Linux, Fedoraproject Fedora.