WordPress Core <= 3.1.2 is vulnerable to Clickjacking

Low priority No impactful threat
<= 3.1.2Vulnerable version(s)
3.1.3Fixed version

Get the fastest vulnerability mitigation with Patchstack!

Get started

Risks

CVSS 7.1

User Interaction Required

While this vulnerability can be initiated by the role shown in "Required Privilege", successful exploitation requires a privileged user to perform an action — such as clicking a malicious link, visiting a crafted page, or submitting a form.

7.1

Clickjacking

This could allow a malicious actor to trick users into clicking a webpage element which is not visible or disguised as something else.

CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.

Solutions

This security issue has a low severity impact and is unlikely to be exploited.

Update to version 3.1.3 or later.

Update to version 3.1.3 or later to resolve the vulnerability.

Details

Have additional information or questions about this entry? Let us know.

Weekly WordPress security intelligence delivered to your inbox.