// For flags

CVE-2018-6389

WordPress Core < 5.0 - Denial of Service

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

27
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.

En WordPress hasta la versiĆ³n 4.9.2, los atacantes no autenticados puede provocar una denegaciĆ³n de servicio (consumo de recursos) utilizando una lista grande de archivos .js registrados (de wp-includes/script-loader.php) para construir una serie de peticiones para cargar cada archivo muchas veces.

In WordPress before 5.0, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times. It looks like most of the slowness was due to forcing PHP to repeatedly compress the output scripts, which was addressed in 5.0.

WordPress Core suffers from a load-scripts.php denial of service vulnerability.

*Credits: Barak Tawily
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-01-29 CVE Reserved
  • 2018-02-05 CVE Published
  • 2018-02-05 First Exploit
  • 2024-08-05 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-400: Uncontrolled Resource Consumption
CAPEC
References (31)
URL Date SRC
https://packetstorm.news/files/id/146249 2018-02-06
https://packetstorm.news/files/id/146243 2018-02-05
https://www.exploit-db.com/exploits/43968 2024-08-05
https://github.com/safebuffer/CVE-2018-6389 2018-02-06
https://github.com/knqyf263/CVE-2018-6389 2018-02-07
https://github.com/armaanpathan12345/WP-DOS-Exploit-CVE-2018-6389 2018-05-04
https://github.com/thechrono13/PoC---CVE-2018-6389 2018-02-26
https://github.com/ianxtianxt/CVE-2018-6389 2019-12-22
https://github.com/dsfau/wordpress-CVE-2018-6389 2018-02-09
https://github.com/amit-pathak009/CVE-2018-6389-FIX 2023-01-23
https://github.com/Jetserver/CVE-2018-6389-FIX 2018-02-18
https://github.com/mudhappy/Wordpress-Hack-CVE-2018-6389 2018-04-20
https://github.com/alessiogilardi/PoC---CVE-2018-6389 2019-03-04
https://github.com/vineetkia/Wordpress-DOS-Attack-CVE-2018-6389 2019-11-11
https://github.com/yolabingo/wordpress-fix-cve-2018-6389 2018-02-08
https://github.com/rastating/modsecurity-cve-2018-6389 2023-01-28
https://github.com/JulienGadanho/cve-2018-6389-php-patcher 2018-12-02
https://github.com/BlackRouter/cve-2018-6389 2018-02-26
https://github.com/JavierOlmedo/wordpress-cve-2018-6389 2018-03-19
https://github.com/m3ssap0/wordpress_cve-2018-6389 2022-05-17
https://github.com/s0md3v/Shiva 2024-11-14
https://github.com/ItinerisLtd/trellis-cve-2018-6389 2024-04-23
https://github.com/Zazzzles/Wordpress-DOS 2024-08-12
https://github.com/fakedob/tvsz 2024-03-18
https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html 2024-08-05
https://github.com/UltimateHackers/Shiva 2024-08-05
https://thehackernews.com/2018/02/wordpress-dos-exploit.html 2024-08-05
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Wordpress
Search vendor "Wordpress"
Wordpress
Search vendor "Wordpress" for product "Wordpress"
<= 4.9.2
Search vendor "Wordpress" for product "Wordpress" and version " <= 4.9.2"
-
Affected