WordPress 4.8.2 stores cleartext wp_signups.activation_key values (but stores the analogous wp_users.user_activation_key values as hashes), which might make it easier for remote attackers to hijack unactivated user accounts by leveraging database read access (such as access gained through an unspecified SQL injection vulnerability).
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securitytracker.com/id/1039554 | Third Party Advisory VDB Entry | 
| https://core.trac.wordpress.org/ticket/38474 | Exploit Issue Tracking Third Party Advisory | 
| https://www.debian.org/security/2017/dsa-3997 | Third Party Advisory | 
| http://www.securitytracker.com/id/1039554 | Third Party Advisory VDB Entry | 
| https://core.trac.wordpress.org/ticket/38474 | Exploit Issue Tracking Third Party Advisory | 
| https://www.debian.org/security/2017/dsa-3997 | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:13
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securitytracker.com/id/1039554 - Third Party Advisory, VDB Entry | |
| References | () https://core.trac.wordpress.org/ticket/38474 - Exploit, Issue Tracking, Third Party Advisory | |
| References | () https://www.debian.org/security/2017/dsa-3997 - Third Party Advisory | 
Information
                Published : 2017-10-03 01:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-14990
Mitre link : CVE-2017-14990
CVE.ORG link : CVE-2017-14990
JSON object : View
Products Affected
                debian
- debian_linux
 
wordpress
- wordpress
 
CWE
                
                    
                        
                        CWE-312
                        
            Cleartext Storage of Sensitive Information
