CVE-2021-23227: WordPress plugin vulnerability

Published by CVE Tracker on

Cross-Site Request Forgery (CSRF) vulnerability discovered in PHP Everywhere (WordPress plugin) versions (<= 2.0.2).

How to mitigate CVE-2021-23227

Time needed: 5 minutes.

Follow the instructions, as they will assist you in mitigating the WordPress vulnerability that been reported in CVE-2021-23227.

  1. Install the latest version of WordPress

    Navigate to the official WordPress website and download the latest version of WordPress. The latest version contains the CVE-2021-23227 fix.
    Update to the latest version

  2. Perform a vulnerability assessment

    Perform a scan on your WordPress environment(s), and check for vulnerabilities. Verify if CVE-2021-23227 has been mitigated.

  3. Utilize the references

    The CVE-2021-23227 references have been provided for a reason. Utilize these references and make sure that you are correctly informed.

References

  • patchstack.com/database/vulnerability/php-everywhere/wordpress-php-everywhere-plugin-2-0-2-cross-site-request-forgery-csrf-vulnerability
  • patchstack.com/database/vulnerability/php-everywhere/wordpress-php-everywhere-plugin-2-0-2-cross-site-request-forgery-csrf-vulnerability
  • wordpress.org/plugins/php-everywhere/#developers
  • wordpress.org/plugins/php-everywhere/#developers
  • Share this information