{"id":"CVE-2017-6819","details":"In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This.","modified":"2026-04-10T04:00:44.583Z","published":"2017-03-12T01:59:00.350Z","references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/96602"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037959"},{"type":"FIX","url":"https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/"},{"type":"FIX","url":"https://wpvulndb.com/vulnerabilities/8770"},{"type":"FIX","url":"https://codex.wordpress.org/Version_4.7.3"},{"type":"FIX","url":"https://github.com/WordPress/WordPress/commit/263831a72d08556bc2f3a328673d95301a152829"},{"type":"EVIDENCE","url":"https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_press_this_function_allows_dos.html"},{"type":"EVIDENCE","url":"http://openwall.com/lists/oss-security/2017/03/06/7"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wordpress/wordpress","events":[{"introduced":"0"},{"last_affected":"1ea8e9a4f03f425a6a77c3487528fedd3f33c100"},{"fixed":"263831a72d08556bc2f3a328673d95301a152829"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.7.2"}]}}],"versions":["4.7.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-6819.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}