{"id":"CVE-2017-5611","details":"SQL injection vulnerability in wp-includes/class-wp-query.php in WP_Query in WordPress before 4.7.2 allows remote attackers to execute arbitrary SQL commands by leveraging the presence of an affected plugin or theme that mishandles a crafted post type name.","modified":"2026-04-10T04:02:35.277941Z","published":"2017-01-30T04:59:00.610Z","references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3779"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037731"},{"type":"ADVISORY","url":"https://codex.wordpress.org/Version_4.7.2"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95816"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"FIX","url":"https://github.com/WordPress/WordPress/commit/85384297a60900004e27e417eac56d24267054cb"},{"type":"FIX","url":"https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/"},{"type":"FIX","url":"https://wpvulndb.com/vulnerabilities/8730"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/01/28/5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wordpress/wordpress","events":[{"introduced":"0"},{"last_affected":"c840eb9da2ef1c7a23d3ec2d63c0d953fed56926"},{"fixed":"85384297a60900004e27e417eac56d24267054cb"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.7.1"}]}}],"versions":["4.7.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-5611.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.1.1.9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.4.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}