yaman.olx.ph/wordpress is using a very vulnerable version of WordPress and contains directory listing
Critical
O
OLX
Submitted None
Actions:
Reported by
mohamedsherif
Vulnerability Details
Technical details and impact analysis
__Hello ,__
I want to report that your website is using a vulnerable version of WordPress which is 4.7 (Released on 2016-12-06) . This Can be identified from the read me file located [here](https://yaman.olx.ph/wordpress/readme.html) , and that your website contains directory listing of the web-includes located [here](https://yaman.olx.ph/wordpress/wp-includes/)ز
# Bugs in this WordPress version
__[!] Potential Remote Command Execution (RCE) in PHPMailer__
Reference: https://wpvulndb.com/vulnerabilities/8714
[i] Fixed in: 4.7.1
__[!] User Information Disclosure via REST API__
Reference: https://wpvulndb.com/vulnerabilities/8715
[i] Fixed in: 4.7.1
__[!] Authenticated Cross-Site scripting (XSS) in update-core.php__
Reference: https://wpvulndb.com/vulnerabilities/8716
[i] Fixed in: 4.7.1
__[!] Cross-Site Request Forgery (CSRF) via Flash Upload__
Reference: https://wpvulndb.com/vulnerabilities/8717
[i] Fixed in: 4.7.1
__[!] Stored Cross-Site Scripting (XSS) via Theme Name fallback__
Reference: https://wpvulndb.com/vulnerabilities/8718
[i] Fixed in: 4.7.1
__[!] Post via Email Checks mail.example.com by Default__
Reference: https://wpvulndb.com/vulnerabilities/8719
[i] Fixed in: 4.7.1
__[!] Accessibility Mode Cross-Site Request Forgery (CSRF)__
Reference: https://wpvulndb.com/vulnerabilities/8720
[i] Fixed in: 4.7.1
__[!] Cryptographically Weak Pseudo-Random Number Generator (PRNG)__
Reference: https://wpvulndb.com/vulnerabilities/8721
[i] Fixed in: 4.7.1
__[!] Press This UI Available to Unauthorised Users__
Reference: https://wpvulndb.com/vulnerabilities/8729
[i] Fixed in: 4.7.2
__[!] WP_Query SQL Injection__
Reference: https://wpvulndb.com/vulnerabilities/8730
[i] Fixed in: 4.7.2
__[!] Cross-Site Scripting (XSS) in posts list table__
Reference: https://wpvulndb.com/vulnerabilities/8731
[i] Fixed in: 4.7.2
__[!] Unauthenticated Page/Post Content Modification via REST API__
Reference: https://wpvulndb.com/vulnerabilities/8734
Reference: https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html
[i] Fixed in: 4.7.2
# Fix
Updating your blog to the latest version which is 4.7.2 as i believe
__Thanks ,
Mohamed Sherif__
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-Site Request Forgery (CSRF)