Loading HuntDB...

yaman.olx.ph/wordpress is using a very vulnerable version of WordPress and contains directory listing

Critical
O
OLX
Submitted None
Reported by mohamedsherif

Vulnerability Details

Technical details and impact analysis

Cross-Site Request Forgery (CSRF)
__Hello ,__ I want to report that your website is using a vulnerable version of WordPress which is 4.7 (Released on 2016-12-06) . This Can be identified from the read me file located [here](https://yaman.olx.ph/wordpress/readme.html) , and that your website contains directory listing of the web-includes located [here](https://yaman.olx.ph/wordpress/wp-includes/)ز # Bugs in this WordPress version __[!] Potential Remote Command Execution (RCE) in PHPMailer__ Reference: https://wpvulndb.com/vulnerabilities/8714 [i] Fixed in: 4.7.1 __[!] User Information Disclosure via REST API__ Reference: https://wpvulndb.com/vulnerabilities/8715 [i] Fixed in: 4.7.1 __[!] Authenticated Cross-Site scripting (XSS) in update-core.php__ Reference: https://wpvulndb.com/vulnerabilities/8716 [i] Fixed in: 4.7.1 __[!] Cross-Site Request Forgery (CSRF) via Flash Upload__ Reference: https://wpvulndb.com/vulnerabilities/8717 [i] Fixed in: 4.7.1 __[!] Stored Cross-Site Scripting (XSS) via Theme Name fallback__ Reference: https://wpvulndb.com/vulnerabilities/8718 [i] Fixed in: 4.7.1 __[!] Post via Email Checks mail.example.com by Default__ Reference: https://wpvulndb.com/vulnerabilities/8719 [i] Fixed in: 4.7.1 __[!] Accessibility Mode Cross-Site Request Forgery (CSRF)__ Reference: https://wpvulndb.com/vulnerabilities/8720 [i] Fixed in: 4.7.1 __[!] Cryptographically Weak Pseudo-Random Number Generator (PRNG)__ Reference: https://wpvulndb.com/vulnerabilities/8721 [i] Fixed in: 4.7.1 __[!] Press This UI Available to Unauthorised Users__ Reference: https://wpvulndb.com/vulnerabilities/8729 [i] Fixed in: 4.7.2 __[!] WP_Query SQL Injection__ Reference: https://wpvulndb.com/vulnerabilities/8730 [i] Fixed in: 4.7.2 __[!] Cross-Site Scripting (XSS) in posts list table__ Reference: https://wpvulndb.com/vulnerabilities/8731 [i] Fixed in: 4.7.2 __[!] Unauthenticated Page/Post Content Modification via REST API__ Reference: https://wpvulndb.com/vulnerabilities/8734 Reference: https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html [i] Fixed in: 4.7.2 # Fix Updating your blog to the latest version which is 4.7.2 as i believe __Thanks , Mohamed Sherif__

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-Site Request Forgery (CSRF)