Input validation vulnerability in WordPress 3.6.1

WordPress Core, the software that runs the website, has a security vulnerability. This means that it is possible for an unauthenticated user to perform certain actions on the website under the identity of another user. This is due to the fact that in versions of WordPress before 6.0.3, when using wp-trackback.php (a file that helps track changes to the website), the identity of the user whose cookies were sent with the request would be assumed. To fix this, new versions of WordPress will assign the identity of an unauthenticated user (meaning one who isn’t logged in) to the ID of 0.

Detected in:

WordPress fixed vulnerable versions: >= * <= 3.6.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.