If the casualty is a typical client, an effective CSRF assault can compel the client to perform state-changing solicitations like moving assets, changing their email address, etc.
Assuming that the casualty is a regulatory record, CSRF can think twice about the web application.”
These are the weaknesses found:
1. Stored XSS through wp-mail.php (post by email)
2. Open divert in ‘wp_nonce_ays’
3. Sender’s email address is uncovered in wp-mail.php
4. Media Library – Reflected XSS through SQLi
5. Cross-Site Solicitation Imitation (CSRF) in wp-trackback.php
6. Stored XSS through the Customizer
7. Revert shared client occasions presented in 50790
8. Stored XSS in WordPress Center through Remark Altering
9. Data openness through the REST Expressions/Labels Endpoint
10. Content from multipart messages spilled
11. SQL Infusion because of ill-advised sterilization in ‘WP_Date_Query.’
12. RSS Gadget: Put away the XSS issue
13. Stored XSS in the hunt block
14. Feature Picture Block: XSS issue
15. RSS Block: Put away the XSS issue
16. Fix gadget block XSS