An improper error handling in HTTPS requests management in WP-CLI version 0.12.0 and later allows remote attackers able to intercept the communication to remotely disable the certificate verification on WP-CLI side, gaining full control over the communication content, including the ability to impersonate update servers and push malicious updates towards WordPress instances controlled by the vulnerable WP-CLI agent, or push malicious updates toward WP-CLI itself. https://github.com/wp-cli/config-command/pull/128 https://github.com/wp-cli/core-command/pull/186 https://github.com/wp-cli/wp-cli/pull/5523 https://github.com/wp-cli/package-command/pull/138 https://github.com/wp-cli/extension-command/pull/287 https://github.com/wp-cli/checksum-command/pull/86 https://github.com/wp-cli/wp-cli/security/advisories/GHSA-rwgm-f83r-v3qj
Created wp-cli tracking bugs for this issue: Affects: epel-7 [bug 1969377] Affects: fedora-all [bug 1969376]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.