Medium severity6.5NVD Advisory· Published Mar 12, 2017· Updated May 13, 2026
CVE-2017-6819
CVE-2017-6819
Description
In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This.
Affected products
1- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*Range: <=4.7.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- codex.wordpress.org/Version_4.7.3nvdPatchVendor Advisory
- github.com/WordPress/WordPress/commit/263831a72d08556bc2f3a328673d95301a152829nvdIssue TrackingPatchThird Party Advisory
- wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/nvdPatchRelease NotesVendor Advisory
- wpvulndb.com/vulnerabilities/8770nvdPatchThird Party Advisory
- openwall.com/lists/oss-security/2017/03/06/7nvdExploitMailing ListThird Party Advisory
- sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_press_this_function_allows_dos.htmlnvdExploitThird Party Advisory
- www.securityfocus.com/bid/96602nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1037959nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.