WordPress 4.8.2 stores cleartext wp_signups.activation_key values (but stores the analogous wp_users.user_activation_key values as hashes), which might make it easier for remote attackers to hijack unactivated user accounts by leveraging database read access (such as access gained through an unspecified SQL injection vulnerability).
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1151-1 | wordpress security update |
Debian DLA |
DLA-1151-2 | wordpress regression update |
Debian DSA |
DSA-3997-1 | wordpress security update |
EUVD |
EUVD-2017-6466 | WordPress 4.8.2 stores cleartext wp_signups.activation_key values (but stores the analogous wp_users.user_activation_key values as hashes), which might make it easier for remote attackers to hijack unactivated user accounts by leveraging database read access (such as access gained through an unspecified SQL injection vulnerability). |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T19:42:22.357Z
Reserved: 2017-10-02T00:00:00
Link: CVE-2017-14990
No data.
Status : Deferred
Published: 2017-10-03T01:29:03.013
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-14990
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD