PatchSiren cyber security CVE debrief
CVE-2017-5490 Wordpress CVE debrief
CVE-2017-5490 is a cross-site scripting (XSS) issue in WordPress versions before 4.7.1. The vulnerable path involves theme-name fallback handling in wp-includes/class-wp-theme.php, with related admin-side theme installer logic noted in wp-admin/includes/class-theme-installer-skin.php. A crafted theme directory name could be rendered into web output and allow arbitrary script or HTML injection. The NVD record classifies the issue as medium severity and links it to CWE-79.
- Vendor
- Wordpress
- Product
- CVE-2017-5490
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-15
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-15
- Advisory updated
- 2026-05-13
Who should care
WordPress site operators, administrators, managed hosting providers, and security teams responsible for theme installation and admin interface exposure should care, especially if any systems were running WordPress 4.7 or earlier.
Technical summary
The supplied NVD data describes a CWE-79 XSS weakness in WordPress theme-name fallback logic. The CVSS v3.0 vector is AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network reachability, low attack complexity, no privileges required, and user interaction needed. Impact is limited to confidentiality and integrity, with scope changed. WordPress 4.7.1 release notes and the linked patch commit indicate the issue was addressed in that release line.
Defensive priority
Medium. The flaw is publicly documented and fixed in WordPress 4.7.1, but the supplied data does not indicate known active exploitation or KEV listing.
Recommended defensive actions
- Upgrade WordPress to 4.7.1 or later immediately if any affected version is still in use.
- Review any workflows that install or display themes, especially where theme directory names may come from untrusted sources.
- Confirm the patch referenced by the WordPress commit and 4.7.1 release notes is present in your deployed codebase.
- Limit administrative access to trusted users and keep browser-based admin sessions protected with strong authentication and session hygiene.
- Audit theme packages and custom deployments for unusual directory names or other content that could be rendered in admin interfaces.
Evidence notes
This debrief is based only on the supplied NVD record and linked official/vendor references. The core facts come from the NVD description, CVSS vector, CWE-79 classification, and affected version range ending at WordPress 4.7. The WordPress 4.7.1 release notes and linked GitHub patch commit support that the issue was corrected in 4.7.1. No exploitation or KEV designation is asserted because none is present in the supplied corpus.
Official resources
-
CVE-2017-5490 CVE record
CVE.org
-
CVE-2017-5490 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Release Notes, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Patch
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Publicly disclosed in the supplied NVD record on 2017-01-15, with the vulnerable condition described as affecting WordPress before 4.7.1. The NVD record was modified on 2026-05-13. No KEV listing is included in the supplied data.