WP <= 6.1.1 - Unauthenticated Blind SSRF via DNS Rebinding
CVE-2022-3590
5.9MEDIUM
Key Information
- Vendor
- WordPress
- Status
- WordPress
- Vendor
- CVE Published:
- 14 December 2022
Badges
👾 Exploit Exists🔴 Public PoC
Summary
WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden.
Affected Version(s)
WordPress <= 6.1.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
CVSS V3.1
Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit exists.
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database1 Proof of Concept(s)
Credit
Thomas Chauchefoin
WPScan