Name | CVE-2016-9263 |
Description | WordPress through 4.8.2, when domain-based flashmediaelement.swf sandboxing is not used, allows remote attackers to conduct cross-domain Flash injection (XSF) attacks by leveraging code contained within the wp-includes/js/mediaelement/flashmediaelement.swf file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1151-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
wordpress (PTS) | buster | 5.0.15+dfsg1-0+deb10u1 | fixed |
| buster (security) | 5.0.20+dfsg1-0+deb10u1 | fixed |
| bullseye (security), bullseye | 5.7.8+dfsg1-0+deb11u2 | fixed |
| bookworm | 6.1.1+dfsg1-1 | fixed |
| trixie | 6.3.2+dfsg1-1 | fixed |
| sid | 6.4.1+dfsg1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
wordpress | source | wheezy | 3.6.1+dfsg-1~deb7u17 | | DLA-1151-1 | |
wordpress | source | (unstable) | 4.1+dfsg-1 | | | |
Notes
https://opnsec.com/2017/10/cve-2016-9263-unpatched-xsf-vulnerability-in-wordpress/
flashmediaelement.swf removed from source tree starting in 4.1+dfsg-1