WordPress 4.8.2 stores cleartext wp_signups.activation_key values (but stores the analogous wp_users.user_activation_key values as hashes), which might make it easier for remote attackers to hijack unactivated user accounts by leveraging database read access (such as access gained through an unspecified SQL injection vulnerability).
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1039554 | Third Party Advisory VDB Entry |
https://core.trac.wordpress.org/ticket/38474 | Exploit Issue Tracking Third Party Advisory |
https://www.debian.org/security/2017/dsa-3997 | Third Party Advisory |
http://www.securitytracker.com/id/1039554 | Third Party Advisory VDB Entry |
https://core.trac.wordpress.org/ticket/38474 | Exploit Issue Tracking Third Party Advisory |
https://www.debian.org/security/2017/dsa-3997 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-10-03 01:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-14990
Mitre link : CVE-2017-14990
CVE.ORG link : CVE-2017-14990
JSON object : View
Products Affected
wordpress
- wordpress
debian
- debian_linux
CWE
CWE-312
Cleartext Storage of Sensitive Information