Skip to content

WordPress: Authenticated XXE attack when installation is running PHP 8

Moderate
ehti published GHSA-rv47-pc52-qrhh Apr 15, 2021

Package

No package listed

Affected versions

5.6 - 5.7

Patched versions

5.7.1

Description

Impact

A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack.

Patches

This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.

References

https://wordpress.org/news/category/security/

For more information

If you have any questions or comments about this advisory:

Severity

Moderate

CVE ID

CVE-2021-29447

Weaknesses

Improper Restriction of XML External Entity Reference

The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. Learn more on MITRE.