Intel

AIKIDO-2026-10349

roots/wordpress is vulnerable to Improper Input Validation

Improper Input Validation Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

75

High Risk

This Affects:

PHProots/wordpress
0.0.1 - 4.8.27
Fixed in 4.8.28
4.9.0 - 4.9.28
Fixed in 4.9.29
5.0.0 - 5.0.24
Fixed in 5.0.25
5.1.0 - 5.1.21
Fixed in 5.1.22
5.2.0 - 5.2.23
Fixed in 5.2.24
5.3.0 - 5.3.20
Fixed in 5.3.21
5.4.0 - 5.4.18
Fixed in 5.4.19
5.5.0 - 5.5.17
Fixed in 5.5.18
5.6.0 - 5.6.16
Fixed in 5.6.17
5.7.0 - 5.7.14
Fixed in 5.7.15
5.8.0 - 5.8.12
Fixed in 5.8.13
5.9.0 - 5.9.12
Fixed in 5.9.13
6.0.0 - 6.1.9
Fixed in 6.1.10
6.2.0 - 6.2.8
Fixed in 6.2.9
6.3.0 - 6.3.7
Fixed in 6.3.8
6.4.0 - 6.4.7
Fixed in 6.4.8
6.5.0 - 6.5.7
Fixed in 6.5.8
6.6.0 - 6.6.4
Fixed in 6.6.5
6.7.0 - 6.7.4
Fixed in 6.7.5
6.8.0 - 6.8.4
Fixed in 6.8.5
6.9.0 - 6.9.3
Fixed in 6.9.4

TL;DR

Affected versions of this package include releases that incorporated WordPress components prior to the upstream security fixes, exposing multiple vulnerabilities including Blind SSRF, stored XSS, regex-based DoS, authorization bypasses, path traversal in PclZip, and an XXE flaw in the bundled getID3 library. An attacker could exploit these issues by injecting malicious payloads into menus or directives to achieve stored XSS, crafting requests to trigger SSRF or bypass authorization checks, abusing vulnerable regex parsing to cause resource exhaustion, or leveraging path traversal/XXE to access sensitive files or internal services. Successful exploitation may allow data exfiltration, privilege escalation, remote content injection, or disruption of service depending on the affected component and deployment configuration. Immediate upgrade is recommended as these fixes were ported from upstream WordPress security patches addressing multiple independent vulnerabilities.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

roots/wordpress is vulnerable to Improper Input Validation in versions 6.9.0 - 6.9.3, 6.8.0 - 6.8.4, 6.7.0 - 6.7.4, 6.6.0 - 6.6.4, 6.5.0 - 6.5.7, 6.4.0 - 6.4.7, 6.3.0 - 6.3.7, 6.2.0 - 6.2.8, 6.0.0 - 6.1.9, 5.9.0 - 5.9.12, 5.8.0 - 5.8.12, 5.7.0 - 5.7.14, 5.6.0 - 5.6.16, 5.5.0 - 5.5.17, 5.4.0 - 5.4.18, 5.3.0 - 5.3.20, 5.2.0 - 5.2.23, 5.1.0 - 5.1.21, 5.0.0 - 5.0.24, 4.9.0 - 4.9.28 and 0.0.1 - 4.8.27.

How to fix this

Upgrade the roots/wordpress library to the patch version.