WordPress Zero-Day Exposes Password Reset Emails
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
The vulnerability, tracked via the CVE-2017-8295 identifier, affects all WordPress versions and is related to how WordPress sites put together the password reset emails.
An attacker can craft a malicious HTTP request that triggers a tainted password reset operation by injecting a custom SERVER_NAME variable, such as "attacker-domain.com". Therefore when the WordPress site puts together the password reset email, the "From" and "Return-Path" values will be in the form of "[email protected]".
Remediation steps
CVE Vulnerabilities
Last edited: 17 February 2020 11:41 am