Vulnerabilities / WordPress version with known vulnerabilities
PCI-DSS -> 6.2
The installed version of WordPress has multiple known vulnerabilities that may be used by attackers to harmful the clients of the application or the application itself.
The impact of this greatly depends on the vulnerabilities this WordPress version has. Some vulnerabilities may allow only the theft of a user account, giving the attacker the possibility to read and modify content written by the victim and to post on is behalf. However, more serious vulnerabilities may allow the attacker to login with the administrator account and completely control the administration area, possibly destroy all the contents or replacing them with improper content.
This is a common problem amongst WordPress installations, since it becomes outdated quickly, with vulnerabilities being discovered weekly and updated being published at the same pace.
How to fix
The correct solution is to update WordPress to its latest stable version, which will fix any known vulnerability, improving the security of the web application.
The easiest method to install the latest version is through the WordPress update feature:
- go to the
/wp-admin/update-core.phppage on your application.
- an indication of an update should appear:
An updated version of WordPress is available.If it doesn’t appear, press
Update Nowand follow the instructions. This should only take a few minutes.
- you should also update any plugin or theme you have installed, since these are often a source of vulnerabilities. To this press
Update Pluginsand afterwards
If you cannot update through the site (for instance, if the update process fails), you will have to do it manually. The manual update process is described at the WordPress site, at
- go to the