WordPress.Comment.Content.Filter.Remote.Code.Execution

description-logoDescription

This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in WordPress Project WordPress.
A remote, unauthenticated attacker could exploit this vulnerability by enticing an authenticated user to open a web page or link. Successful exploitation, in the worst case, could lead to execution of arbitrary PHP code.

affected-products-logoAffected Products

WordPress Project WordPress prior to 5.1.1

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2023-04-26 23.541 Sig Added
2019-06-13 14.632 Default_action:pass:drop
2019-05-23 14.619