Description
WordPress is prone to multiple vulnerabilities, including cross-site scripting, security bypass, information disclosure and PHP object injection vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks, to perform otherwise restricted actions and subsequently delete files that they weren't authorized to or create posts of unauthorized post types, to obtain sensitive information, or to possibly execute arbitrary PHP code within the context of the affected webserver process. WordPress version 5.0 is vulnerable.
Remediation
Update to WordPress version 5.0.1 or latest
References
https://blog.ripstech.com/2018/wordpress-post-type-privilege-escalation/
https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/
http://foreversong.cn/archives/1364
https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
Related Vulnerabilities
ReviveAdserver Deserialization of Untrusted Data Vulnerability (CVE-2017-5830)
Django Incorrect Regular Expression Vulnerability (CVE-2018-7536)
WordPress Plugin WP-Recall-Registration, Profile, Commerce & More Cross-Site Scripting (16.24.47)
WordPress Plugin Rating-Widget:Star Review System Security Bypass (2.8.9)
Apache Tomcat Unprotected Transport of Credentials Vulnerability (CVE-2023-28708)