Skip to content Skip to sidebar Skip to footer
Reading Time: < 1 minute

The vulnerability allows an attacker to inject JavaScript in the WordPress comment field; the comment has to be at least 66,000 characters long and it will be triggered when the comment is viewed.
Date:- April 27th, 2015.

“An unauthenticated attacker can store JavaScript on WordPress pages and blog posts. If triggered by an administrator, this leads to server-side code execution under default settings,”.
“A usable comment form is required. It looks like the script is not executed in the admin Dashboard, but only when viewing the post/page where the comment was entered. If comment moderation is enabled (the default setting) then the comment won’t appear on the page until it has been approved by an admin/moderator. Under default settings, after one ‘harmless’ comment is approved, the attacker is free from subsequent moderation and can inject the exploit to several pages and blog posts.”
“Best solution until a patch is made available is to disable comments and not approve any”.

More Information:-http://klikki.fi/adv/wordpress2.html
Source from:-https://threatpost.com/details-on-wordpress-zero-day-disclosed/112435