Description
WordPress is prone to multiple vulnerabilities, including cross-site scripting, privilege escalation, security bypass, Denial of Service and PHP object injection vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks, to bypass the expected capabilities check, to perform otherwise restricted actions and subsequently delete arbitrary files, to deny service to legitimate users, or to possibly execute arbitrary PHP code within the context of the affected webserver process. WordPress versions 4.7.x ranging from 4.7 and up to (and including) 4.7.18 are vulnerable.
Remediation
Update to WordPress version 4.7.19 or latest
References
https://blog.sucuri.net/2020/10/reflected-xss-in-wordpress-v5-5-1-and-lower.html
https://blog.wpscan.com/2020/10/30/wordpress-5.5.2-security-release.html
https://threatpost.com/wordpress-patches-rce-bug/160812/
https://wordpress.org/support/wordpress-version/version-4-7-19/
Related Vulnerabilities
Atlassian Jira CVE-2021-39122 Vulnerability (CVE-2021-39122)
Joomla Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2013-1454)
Joomla Improper Input Validation Vulnerability (CVE-2008-4105)
osCommerce Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-18572)
WordPress Plugin Google Drive for WordPress Arbitrary File Deletion (2.2)