Description
WordPress is prone to multiple vulnerabilities, including cross-site scripting, cross-site request forgery and possible remote code execution vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials, to perform certain administrative actions and gain unauthorized access to the affected application, to possibly execute arbitrary commands with the privileges of the user running the application, to possibly compromise the application or the underlying database, or to possibly compromise a vulnerable system. WordPress versions 4.3.x ranging from 4.3 and up to (and including) 4.3.6 are vulnerable.
Remediation
Update to WordPress version 4.3.7 or latest
References
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
https://www.mehmetince.net/low-severity-wordpress/
https://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html
https://exploitbox.io/exploit/wordpress-rce-exploit.sh
Related Vulnerabilities
WordPress Plugin Top 10-Popular posts for WordPress Multiple Vulnerabilities (3.2.3)
WordPress Plugin GiveWP-Donation and Fundraising Platform Cross-Site Request Forgery (2.25.2)
WordPress Plugin Simple Matted Thumbnails Cross-Site Scripting (1.01)
ASP.NET MVC Improper Input Validation Vulnerability (CVE-2017-0247)
ownCloud Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3835)