Improper Privilege Management
WordPress before 3.7.35, 3.8.x before 3.8.35, 3.9.x before 3.9.33, 4.0.x before 4.0.32, 4.1.x before 4.1.32, 4.2.x before 4.2.29, 4.3.x before 4.3.25, 4.4.x before 4.4.24, 4.5.x before 4.5.23, 4.6.x before 4.6.20, 4.7.x before 4.7.19, 4.8.x before 4.8.15, 4.9.x before 4.9.16, 5.0.x before 5.0.11, 5.1.x before 5.1.7, 5.2.x before 5.2.8, 5.3.x before 5.3.5, 5.4.x before 5.4.3, and 5.5.x before 5.5.2 allows attackers to gain privileges via XML-RPC.
CWE-269 - Improper Privilege Management
An effective privilege management infrastructure provides valid users with required access and privileges across heterogeneous technology environments. An application with a faulty privilege management infrastructure allows higher than authorized privileges or enables privilege escalation. This can lead to security incidents such as system infiltration, data breach, and complete system takeover.