Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/", "name": "https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4", "name": "https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4", "tags": ["Patch"], "refsource": "CONFIRM"}, {"url": "https://codex.wordpress.org/Version_4.7.1", "name": "https://codex.wordpress.org/Version_4.7.1", "tags": ["Release Notes", "Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "http://www.openwall.com/lists/oss-security/2017/01/14/6", "name": "[oss-security] 20170114 Re: CVE Request: Wordpress: 8 security issues in 4.7", "tags": ["Mailing List", "Third Party Advisory"], "refsource": "MLIST"}, {"url": "http://www.securityfocus.com/bid/95401", "name": "95401", "tags": [], "refsource": "BID"}, {"url": "https://wpvulndb.com/vulnerabilities/8721", "name": "https://wpvulndb.com/vulnerabilities/8721", "tags": [], "refsource": "MISC"}, {"url": "http://www.securitytracker.com/id/1037591", "name": "1037591", "tags": [], "refsource": "SECTRACK"}, {"url": "http://www.debian.org/security/2017/dsa-3779", "name": "DSA-3779", "tags": [], "refsource": "DEBIAN"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "wp-includes/ms-functions.php in the Multisite WordPress API in WordPress before 4.7.1 does not properly choose random numbers for keys, which makes it easier for remote attackers to bypass intended access restrictions via a crafted (1) site signup or (2) user signup."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-338"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2017-5493", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}}, "publishedDate": "2017-01-15T02:59Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "4.7"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2019-10-03T00:03Z"}