A few days ago, WordPress released a patch for their software. This patch updates WordPress to version 5.8.3, and addresses four vulnerabilities. Three of these vulnerabilities have been rated as ‘high importance’ with two CVSS scores of 8.0, a 7.4, and a 6.6, as they allow for different kinds of attacks. This article explains how the different vulnerabilities could be abused, and how we were able to find the relevant WordPress software to check for risks.
To repeat: the latest patch to WordPress version 5.8.3 mitigates the vulnerabilities described below. If you haven’t done so already, please update your WordPress software as soon as possible.
The four vulnerabilities, named CVE-2022-21661 to -21664, allowed for several ways threat actors could access systems or obtain private information. For instance, an SQL injection could result in the disclosure of account information, as it does not require any authentication. An attacker could therefore obtain privilege rights to compromise a site.
As an organisation’s web hosting is often scattered over several servers and hosting services, it is possible to have different versions of WordPress running for different (sub)domains. This also makes it harder for IT teams to identify all of their digital assets with connection to WordPress servers, and to determine whether or not those assets pose a risk and should therefore be updated.
Attack Surface Monitoring
We have been able to identify and assess the WordPress servers in the attack surfaces of our clients via a specific query in our Attack Surface Management platform. It provides a list of all assets related to WordPress, with further classifications of risk.
These automated insights will save valuable time when mitigating risks is a sudden priority. Knowing what software is running where at all times allows for much faster action, and with much more precision. As threat actors are making use of automated hacking techniques, automated and continuous monitoring is the key to staying in control over your attack surface.
Interested in finding out how we can help you identify and mitigate risks such as the WordPress vulnerabilities? Book your free demo with us here: