{"id":"CVE-2019-9787","details":"WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. The XSS results in administrative access, which allows arbitrary changes to .php files. This is related to wp-admin/includes/ajax-actions.php and wp-includes/comment.php.","modified":"2026-04-10T04:20:58.477727Z","published":"2019-03-14T16:29:00.337Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00044.html"},{"type":"WEB","url":"https://wpvulndb.com/vulnerabilities/9230"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4677"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/107411"},{"type":"ADVISORY","url":"https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/"},{"type":"ADVISORY","url":"https://wordpress.org/support/wordpress-version/version-5-1-1/"},{"type":"FIX","url":"https://github.com/WordPress/WordPress/commit/0292de60ec78c5a44956765189403654fe4d080b"},{"type":"EVIDENCE","url":"https://blog.ripstech.com/2019/wordpress-csrf-to-rce/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wordpress/wordpress","events":[{"introduced":"0"},{"fixed":"18267e68232aa342ad5ac6a15da076831f0cf547"},{"fixed":"0292de60ec78c5a44956765189403654fe4d080b"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.1.1"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-9787.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}