Yoast SEO 16.7-17.2 - Information Disclosure
ID: CVE-2021-25118
Severity: medium
Author: DhiyaneshDK
Tags: cve2021,cve,wpscan,wordpress,wp-plugin,fpd,wp,yoast
Description
Section titled “Description”Yoast SEO plugin 16.7 to 17.2 is susceptible to information disclosure, The plugin discloses the full internal path of featured images in posts via the wp/v2/posts REST endpoints, which can help an attacker identify other vulnerabilities or help during the exploitation of other identified vulnerabilities.
YAML Source
Section titled “YAML Source”id: CVE-2021-25118
info: name: Yoast SEO 16.7-17.2 - Information Disclosure author: DhiyaneshDK severity: medium description: Yoast SEO plugin 16.7 to 17.2 is susceptible to information disclosure, The plugin discloses the full internal path of featured images in posts via the wp/v2/posts REST endpoints, which can help an attacker identify other vulnerabilities or help during the exploitation of other identified vulnerabilities. impact: | An attacker can exploit this vulnerability to gain sensitive information from the target system. remediation: Fixed in version 17.3. reference: - https://wpscan.com/vulnerability/2c3f9038-632d-40ef-a099-6ea202efb550 - https://plugins.trac.wordpress.org/changeset/2608691 - https://nvd.nist.gov/vuln/detail/CVE-2021-25118 - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-25118 cwe-id: CWE-200 epss-score: 0.00173 epss-percentile: 0.5348 cpe: cpe:2.3:a:yoast:yoast_seo:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: yoast product: yoast_seo framework: wordpress tags: cve2021,cve,wpscan,wordpress,wp-plugin,fpd,wp,yoast
http: - method: GET path: - "{{BaseURL}}/wp-json/wp/v2/posts?per_page=1"
matchers-condition: and matchers: - type: word part: header words: - "application/json"
- type: regex regex: - '"path":"(.*)/wp-content\\(.*)","size'
- type: status status: - 200
extractors: - type: regex group: 1 regex: - '"path":"(.*)/wp-content\\(.*)","size' part: body# digest: 4b0a00483046022100cac2a147612a7e00bf19566aa865efef63776826f00ab9eda35603b5ccaf358d022100fc81df96868c3306af04b63c5c9b23a42c4e6e72639bfc8951dc62c636723f10:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-25118.yaml"