Description
WordPress is prone to multiple vulnerabilities, including cross-site scripting, cross-site request forgery, server-side request forgery and Denial of Service vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks, to perform certain administrative actions and gain unauthorized access to the affected application, to make the vulnerable server perform authentication requests to a remote or internal network database which could potentially be used to expose information and compromise a site or to consume memory and CPU resources, denying service to legitimate users. WordPress versions prior to 3.7.5 are vulnerable.
Remediation
Update to WordPress version 3.7.5 or latest
References
http://klikki.fi/adv/wordpress.html
http://www.behindthefirewalls.com/2014/11/wordpress-denial-of-service-responsible-disclosure.html
http://www.behindthefirewalls.com/2014/12/cve-2014-9016-and-cve-2014-9034-PoC.html
http://secureli.com/wp-content/uploads/2014/11/secureli.com-wordpressed.php_.txt
Related Vulnerabilities
WordPress Plugin Simple Membership Cross-Site Request Forgery (3.8.4)
WordPress Plugin Easy Affiliate Links Cross-Site Scripting (3.7.0)
Moodle Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-7848)
WordPress Plugin WP Support Plus Responsive Ticket System Security Bypass (7.1.4)