WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.
History

Tue, 22 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-01-06T23:00:11.000Z

Updated: 2025-04-22T18:33:55.718Z

Reserved: 2021-11-16T00:00:00.000Z

Link: CVE-2022-21663

cve-icon Vulnrichment

Updated: 2024-08-03T02:46:39.547Z

cve-icon NVD

Status : Modified

Published: 2022-01-06T23:15:08.067

Modified: 2024-11-21T06:45:11.057

Link: CVE-2022-21663

cve-icon Redhat

No data.