vulnerability

FreeBSD: VID-bfcc23b6-3b27-11e6-8e82-002590263bf5 (CVE-2016-5835): wordpress -- multiple vulnerabilities

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Jun 25, 2016
Added
Dec 10, 2025
Modified
Dec 10, 2025

Description

Adam Silverstein reports: WordPress 4.5.3 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. WordPress versions 4.5.2 and earlier are affected by several security issues: redirect bypass in the customizer, reported by Yassine Aboukir; two different XSS problems via attachment names, reported by Jouko Pynnönenand Divyesh Prajapati; revision history information disclosure, reported independently by John Blackbourn from the WordPress security team and by Dan Moen from the Wordfence Research Team; oEmbed denial of service reported by Jennifer Dodd from Automattic; unauthorized category removal from a post, reported by David Herrera from Alley Interactive; password change via stolen cookie, reported by Michael Adams from the WordPress security team; and some less secure sanitize_file_name edge cases reported by Peter Westwood of the WordPress security team.

Solutions

freebsd-upgrade-package-wordpressfreebsd-upgrade-package-de-wordpressfreebsd-upgrade-package-ja-wordpressfreebsd-upgrade-package-ru-wordpressfreebsd-upgrade-package-zh-wordpress-zh_cnfreebsd-upgrade-package-zh-wordpress-zh_tw
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.