[wp-trac] [WordPress Trac] #46705: Harden WP core against "update option" endpoint vulnerabilities

WordPress Trac noreply at wordpress.org
Mon Nov 25 11:01:25 UTC 2019


#46705: Harden WP core against "update option" endpoint vulnerabilities
--------------------------------+------------------------------
 Reporter:  tsewlliw            |       Owner:  (none)
     Type:  feature request     |      Status:  new
 Priority:  normal              |   Milestone:  Awaiting Review
Component:  Options, Meta APIs  |     Version:  5.2
 Severity:  normal              |  Resolution:
 Keywords:                      |     Focuses:
--------------------------------+------------------------------

Comment (by ottok):

 Hackers who find out a SQL injection often make users_can_register=1 and
 default_role=administrator (exampe
 https://www.slideshare.net/ottokekalainen/how-to-investigate-and-recover-
 from-a-security-breach-in-wordpress#29).

 This issue is about nonces, which don't apply to SQL injections. My
 suggestion is to focus efforts on making the values of administrator and
 editor for default_role forbidden to begin with to close this avenue of
 security breaches. See
 https://core.trac.wordpress.org/ticket/43936#comment:12

-- 
Ticket URL: <https://core.trac.wordpress.org/ticket/46705#comment:1>
WordPress Trac <https://core.trac.wordpress.org/>
WordPress publishing platform


More information about the wp-trac mailing list