WordPress CVE-2018-6389 – DoS

There is a DoS vulnerability in all WP installations. It is hidden in the load-scripts.php and load-styles.php files. Their purpose is to combine scripts and styles in the administration to load the admin faster.

You can ask them to combine a huge amount of files, the result will be a huge load and it may kill your webserver.

There is an unofficial patch or you can limit the size of requests for load scripts:

For Apache


RewriteCond %{REQUEST_URI} ^/+wp-admin/+load-(scripts|styles)\.php$
RewriteCond %{QUERY_STRING} load\[\]=(.{800,})$
RewriteRule ^(.*)$ – [F,L]

For Nginx


#block load-scripts|styles.php requests with long argument list
#CVE-2018-6389 impact mitigation
if ($request_uri ~* "^/+wp-admin/+load-(scripts|styles)\.php\?.{800,}$"){
return 403;
}

Question is: Do you still need it in the age of HTTP/2?


Discover more from Vladimir Smitka

Subscribe to get the latest posts sent to your email.

Leave a comment

About Me

My name is Vladimir Smitka and I’m a security researcher/hobbyist from the Czech Republic. I’m also the owner of Lynt, a PPC Agency. I’m also an active member of the Czech WordPress community and one of the WordCamp Prague organizers.

OPEN .GIT GLOBAL SCAN

  • 230 000 000 sites scanned 🔍
  • 390 000 sites affected 😥
  • 100 000 mail send to the developers 📧
  • 150 000+ sites fixed 
  • 100+ possitive comments 🗨️
  • 3500+ thankyou mails ❤️
  • Thousands and thousands sites with another serious issue found 😑

For my research I use affordable Virtual Private Servers from Digital Ocean (they have a great infrascruture), Linode (they have a great understanding for my work) and dedicted servers from Hetzner.

If you like my research, you can make a small donation for coffee and VPS – two basic ingredients for my future security scans.

Follow me

Our Projects

Latest Articles