Description
WordPress is prone to multiple vulnerabilities, including cross-site scripting, security bypass and possible SQL injection vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks, to perform otherwise restricted actions and subsequently access user interface for assigning taxonomy terms or modify the content of any post or page of the website, or to possibly compromise the application, access or modify data or exploit vulnerabilities in the underlying database. WordPress versions 4.7.x ranging from 4.7 and up to (and including) 4.7.1 are vulnerable.
Remediation
Update to WordPress version 4.7.2 or latest
References
https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html
https://gist.github.com/leonjza/2244eb15510a0687ed93160c623762ab
https://blogs.akamai.com/2017/02/wordpress-web-api-vulnerability.html
http://blog.websecurify.com/2017/02/hacking-wordpress-4-7-0-1.html
https://packetstormsecurity.com/files/141039/WordPress-4.7.0-4.7.1-Insert-PHP-Code-Injection.html
https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
Related Vulnerabilities
WordPress Plugin User Role Editor Cross-Site Request Forgery (3.12)
WordPress Plugin Store Locator Plus for WordPress Cross-Site Scripting (5.5.15)
Oracle Database Server CVE-2011-2322 Vulnerability (CVE-2011-2322)
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-3680)