{"id":"CVE-2017-5491","details":"wp-mail.php in WordPress before 4.7.1 might allow remote attackers to bypass intended posting restrictions via a spoofed mail server with the mail.example.com name.","modified":"2026-02-11T13:57:01.530487Z","published":"2017-01-15T02:59:02.987Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/95406"},{"type":"WEB","url":"http://www.securitytracker.com/id/1037591"},{"type":"WEB","url":"https://wpvulndb.com/vulnerabilities/8719"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3779"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2017/01/14/6"},{"type":"ADVISORY","url":"https://codex.wordpress.org/Version_4.7.1"},{"type":"ADVISORY","url":"https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/"},{"type":"FIX","url":"https://github.com/WordPress/WordPress/commit/061e8788814ac87706d8b95688df276fe3c8596a"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2017/01/14/6"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wordpress/wordpress","events":[{"introduced":"0"},{"fixed":"061e8788814ac87706d8b95688df276fe3c8596a"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-5491.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}