WordPress 4.8.2 stores cleartext wp_signups.activation_key values (but stores the analogous wp_users.user_activation_key values as hashes), which might make it easier for remote attackers to hijack unactivated user accounts by leveraging database read access (such as access gained through an unspecified SQL injection vulnerability).
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Link | Tags |
---|---|
https://www.debian.org/security/2017/dsa-3997 | third party advisory vendor advisory |
http://www.securitytracker.com/id/1039554 | third party advisory vdb entry |
https://core.trac.wordpress.org/ticket/38474 | third party advisory issue tracking exploit |