[wp-trac] [WordPress Trac] #46705: Harden WP core against "update option" endpoint vulnerabilities
WordPress Trac
noreply at wordpress.org
Mon Nov 25 11:01:25 UTC 2019
#46705: Harden WP core against "update option" endpoint vulnerabilities
--------------------------------+------------------------------
Reporter: tsewlliw | Owner: (none)
Type: feature request | Status: new
Priority: normal | Milestone: Awaiting Review
Component: Options, Meta APIs | Version: 5.2
Severity: normal | Resolution:
Keywords: | Focuses:
--------------------------------+------------------------------
Comment (by ottok):
Hackers who find out a SQL injection often make users_can_register=1 and
default_role=administrator (exampe
https://www.slideshare.net/ottokekalainen/how-to-investigate-and-recover-
from-a-security-breach-in-wordpress#29).
This issue is about nonces, which don't apply to SQL injections. My
suggestion is to focus efforts on making the values of administrator and
editor for default_role forbidden to begin with to close this avenue of
security breaches. See
https://core.trac.wordpress.org/ticket/43936#comment:12
--
Ticket URL: <https://core.trac.wordpress.org/ticket/46705#comment:1>
WordPress Trac <https://core.trac.wordpress.org/>
WordPress publishing platform
More information about the wp-trac
mailing list