Description
WordPress is prone to multiple vulnerabilities, including cross-site scripting, cross-site request forgery and directory traversal vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials, to perform certain administrative actions and gain unauthorized access to the affected application, or to obtain sensitive information that may help in launching further attacks. WordPress versions 5.7.x ranging from 5.7 and up to (and including) 5.7.8 are vulnerable.
Remediation
Update to WordPress version 5.7.9 or latest
References
https://patchstack.com/articles/wordpress-core-6-2-1-security-update-technical-advisory/
https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/
Related Vulnerabilities
Moodle Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2013-5674)
WordPress Plugin UpdraftPlus WordPress Backup Cross-Site Scripting (1.16.68)
Ruby on Rails Use of Externally-Controlled Format String Vulnerability (CVE-2013-4389)
WordPress Plugin NextGEN Gallery-WordPress Gallery 'Gallery Path' Field Cross-Site Scripting (1.9.5)