Vulnerabilities / WordPress version with known vulnerabilities
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
↓
PCI-DSS -> 6.2
ISO27001 -> A.8.9
The installed version of WordPress has multiple known vulnerabilities that may be used by attackers to harmful the clients of the application or the application itself.
The impact of this greatly depends on the vulnerabilities this WordPress version has. Some vulnerabilities may allow only the theft of a user account, giving the attacker the possibility to read and modify content written by the victim and to post on is behalf. However, more serious vulnerabilities may allow the attacker to login with the administrator account and completely control the administration area, possibly destroy all the contents or replacing them with improper content.
This is a common problem amongst WordPress installations, since it becomes outdated quickly, with vulnerabilities being discovered weekly and updated being published at the same pace.
How to fix
-
The correct solution is to update WordPress to its latest stable version, which will fix any known vulnerability, improving the security of the web application.
The easiest method to install the latest version is through the WordPress update feature:
- go to the
/wp-admin/update-core.php
page on your application. - an indication of an update should appear:
An updated version of WordPress is available.
If it doesn’t appear, pressCheck Again
. - press
Update Now
and follow the instructions. This should only take a few minutes. - you should also update any plugin or theme you have installed, since these are often a source of vulnerabilities. To this press
Update Plugins
and afterwardsUpdate Themes
.
If you cannot update through the site (for instance, if the update process fails), you will have to do it manually. The manual update process is described at the WordPress site, at
https://codex.wordpress.org/Updating_WordPress#Manual_Update
. - go to the