WP <= 6.1.1 - Unauthenticated Blind SSRF via DNS Rebinding

CVE-2022-3590
5.9MEDIUM

Key Information

Vendor
WordPress
Status
WordPress
Vendor
CVE Published:
14 December 2022

Badges

👾 Exploit Exists🔴 Public PoC

Summary

WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden.

Affected Version(s)

WordPress <= 6.1.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit exists.

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)

Credit

Thomas Chauchefoin
WPScan
.