Search criteria

745 vulnerabilities found for wordpress by wordpress

GCVE-1-2025-0041

Vulnerability from gna-1 – Published: 2025-12-19 14:25 – Updated: 2025-12-19 14:54 Exclusively Hosted Service
VLAI?
Title
[online services] Reflected Cross-Site Scripting (XSS) / HTML Injection in Website Hosted in Luxembourg
Summary
The vulnerability, in a series (5) of online services in Luxembourg, occurs because a request parameter (e.g., a search or query parameter) is incorporated directly into the server-generated HTML response without proper escaping. As a result, specially crafted input containing HTML tags and attributes can be interpreted by the browser as active markup rather than plain text. An attacker can exploit this behavior by injecting HTML elements with JavaScript-capable event handlers. When the page is rendered and a user interacts with it (for example, through scrolling or other UI actions), the injected JavaScript executes within the security context of the vulnerable website. This is a reflected XSS issue, meaning the malicious payload is not stored server-side but is immediately reflected in the HTTP response to a single request. Successful exploitation requires a victim to follow a malicious link or otherwise load a request crafted by the attacker. Those vulnerabilities originated from a misconfiguration of the online service. **exclusively-hosted-service**
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
Credits
Mikel Hernández Alonso

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "typo3",
          "vendor": "typo3",
          "versions": [
            {
              "status": "affected"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "wordpress",
          "vendor": "wordpress",
          "versions": [
            {
              "status": "affected"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Mikel Hern\u00e1ndez Alonso"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe vulnerability, in a series (5) of online services in Luxembourg, occurs because a request parameter (e.g., a search or query parameter) is incorporated directly into the server-generated HTML response without proper escaping. As a result, specially crafted input containing HTML tags and attributes can be interpreted by the browser as active markup rather than plain text.\u003c/p\u003e\n\u003cp\u003eAn attacker can exploit this behavior by injecting HTML elements with JavaScript-capable event handlers. When the page is rendered and a user interacts with it (for example, through scrolling or other UI actions), the injected JavaScript executes within the security context of the vulnerable website.\u003c/p\u003e\n\u003cp\u003eThis is a \u003cstrong\u003ereflected XSS\u003c/strong\u003e issue, meaning the malicious payload is not stored server-side but is immediately reflected in the HTTP response to a single request. Successful exploitation requires a victim to follow a malicious link or otherwise load a request crafted by the attacker.\u003c/p\u003e\u003cp\u003eThose vulnerabilities originated from a misconfiguration of the online service.\u003c/p\u003e**exclusively-hosted-service**"
            }
          ],
          "value": "The vulnerability, in a series (5) of online services in Luxembourg, occurs because a request parameter (e.g., a search or query parameter) is incorporated directly into the server-generated HTML response without proper escaping. As a result, specially crafted input containing HTML tags and attributes can be interpreted by the browser as active markup rather than plain text.\n\n\nAn attacker can exploit this behavior by injecting HTML elements with JavaScript-capable event handlers. When the page is rendered and a user interacts with it (for example, through scrolling or other UI actions), the injected JavaScript executes within the security context of the vulnerable website.\n\n\nThis is a reflected XSS issue, meaning the malicious payload is not stored server-side but is immediately reflected in the HTTP response to a single request. Successful exploitation requires a victim to follow a malicious link or otherwise load a request crafted by the attacker.\n\nThose vulnerabilities originated from a misconfiguration of the online service.\n\n**exclusively-hosted-service**"
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003ctt\u003e\u003c/tt\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003ctt\u003eThe sample url is \u0026lt;SAMPLEURL\u0026gt;.lu/recherche/?recherche=%3Caddress+onscrollsnapchange%3Dwindow%5B%27ev%27%2B%27a%27%2B%28%5B%27l%27%2C%27b%27%2C%27c%27%5D%5B0%5D%29%5D%28window%5B%27a%27%2B%27to%27%2B%28%5B%27b%27%2C%27c%27%2C%27d%27%5D%5B0%5D%29%5D%28%27YWxlcnQob3JpZ2luKQ%3D%3D%27%29%29%3B+style%3Doverflow-y%3Ahidden%3Bscroll-snap-type%3Ax%3E%3Cdiv+style%3Dscroll-snap-align%3Acenter%3E1337%3C%2Fdiv%3E%3C%2Faddress%3E\u003cbr\u003e\u003c/tt\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e"
            }
          ],
          "value": "The sample url is \u003cSAMPLEURL\u003e.lu/recherche/?recherche=%3Caddress+onscrollsnapchange%3Dwindow%5B%27ev%27%2B%27a%27%2B%28%5B%27l%27%2C%27b%27%2C%27c%27%5D%5B0%5D%29%5D%28window%5B%27a%27%2B%27to%27%2B%28%5B%27b%27%2C%27c%27%2C%27d%27%5D%5B0%5D%29%5D%28%27YWxlcnQob3JpZ2luKQ%3D%3D%27%29%29%3B+style%3Doverflow-y%3Ahidden%3Bscroll-snap-type%3Ax%3E%3Cdiv+style%3Dscroll-snap-align%3Acenter%3E1337%3C%2Fdiv%3E%3C%2Faddress%3E"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-244",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-244 XSS Targeting URI Placeholders"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "ACTIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "orgId": "00000000-0000-4000-9000-000000000000"
      },
      "references": [
        {
          "tags": [
            "technical-description"
          ],
          "url": "https://owasp.org/Top10/2025/A02_2025-Security_Misconfiguration/"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "tags": [
        "exclusively-hosted-service"
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-07T22:00:00.000Z",
          "value": "Initial reporting"
        }
      ],
      "title": "[online services] Reflected Cross-Site Scripting (XSS) / HTML Injection in Website Hosted in Luxembourg",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "00000000-0000-4000-9000-000000000000",
    "datePublished": "2025-12-19T14:25:00.000Z",
    "dateUpdated": "2025-12-19T14:54:51.594645Z",
    "requesterUserId": "00000000-0000-4000-9000-000000000000",
    "serial": 1,
    "state": "PUBLISHED",
    "vulnId": "gcve-1-2025-0041",
    "vulnerabilitylookup_history": [
      [
        "alexandre.dulaunoy@circl.lu",
        "2025-12-19T14:25:11.812890Z"
      ],
      [
        "alexandre.dulaunoy@circl.lu",
        "2025-12-19T14:30:14.448194Z"
      ],
      [
        "alexandre.dulaunoy@circl.lu",
        "2025-12-19T14:30:45.864429Z"
      ],
      [
        "alexandre.dulaunoy@circl.lu",
        "2025-12-19T14:41:48.015387Z"
      ],
      [
        "alexandre.dulaunoy@circl.lu",
        "2025-12-19T14:42:18.937137Z"
      ],
      [
        "alexandre.dulaunoy@circl.lu",
        "2025-12-19T14:43:23.523252Z"
      ],
      [
        "alexandre.dulaunoy@circl.lu",
        "2025-12-19T14:50:30.687423Z"
      ],
      [
        "alexandre.dulaunoy@circl.lu",
        "2025-12-19T14:54:51.594645Z"
      ]
    ]
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-58674 (GCVE-0-2025-58674)

Vulnerability from nvd – Published: 2025-09-23 18:47 – Updated: 2025-10-01 08:35 X_Open Source
VLAI?
Title
WordPress <= 6.8.2 - (Author+) Cross Site Scripting (XSS) Vulnerability
Summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 6.8 , ≤ 6.8.2 (custom)
Affected: 6.7 , ≤ 6.7.3 (custom)
Affected: 6.6 , ≤ 6.6.3 (custom)
Affected: 6.5 , ≤ 6.5.6 (custom)
Affected: 6.4 , ≤ 6.4.6 (custom)
Affected: 6.3 , ≤ 6.3.6 (custom)
Affected: 6.2 , ≤ 6.2.7 (custom)
Affected: 6.1 , ≤ 6.1.8 (custom)
Affected: 6.0 , ≤ 6.0.10 (custom)
Affected: 5.9 , ≤ 5.9.11 (custom)
Affected: 5.8 , ≤ 5.8.11 (custom)
Affected: 5.7 , ≤ 5.7.13 (custom)
Affected: 5.6 , ≤ 5.6.15 (custom)
Affected: 5.5 , ≤ 5.5.16 (custom)
Affected: 5.4 , ≤ 5.4.17 (custom)
Affected: 5.3 , ≤ 5.3.19 (custom)
Affected: 5.2 , ≤ 5.2.22 (custom)
Affected: 5.1 , ≤ 5.1.20 (custom)
Affected: 5.0 , ≤ 5.0.23 (custom)
Affected: 4.9 , ≤ 4.9.27 (custom)
Affected: 4.8 , ≤ 4.8.26 (custom)
Affected: 4.7 , ≤ 4.7.30 (custom)
Create a notification for this product.
Credits
savphill (Patchstack Bug Bounty Program) John Blackbourn (WordPress core security team lead)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-58674",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-23T19:15:09.886956Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-23T19:17:35.099Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "repo": "https://github.com/WordPress/WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.8.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.8.2",
              "status": "affected",
              "version": "6.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.7.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.7.3",
              "status": "affected",
              "version": "6.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.6.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.6.3",
              "status": "affected",
              "version": "6.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.5.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.5.6",
              "status": "affected",
              "version": "6.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.4.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.6",
              "status": "affected",
              "version": "6.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.3.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.6",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.7",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.9",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.1.8",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.11",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.10",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.11",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.8.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.8.11",
              "status": "affected",
              "version": "5.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.7.14",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.7.13",
              "status": "affected",
              "version": "5.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.6.16",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.6.15",
              "status": "affected",
              "version": "5.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.5.17",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.5.16",
              "status": "affected",
              "version": "5.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.4.18",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.4.17",
              "status": "affected",
              "version": "5.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.3.20",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.3.19",
              "status": "affected",
              "version": "5.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.2.23",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.2.22",
              "status": "affected",
              "version": "5.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.1.21",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.1.20",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.0.24",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.23",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.9.28",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.9.27",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.8.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.8.26",
              "status": "affected",
              "version": "4.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.7.31",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.7.30",
              "status": "affected",
              "version": "4.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "savphill (Patchstack Bug Bounty Program)"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "John Blackbourn (WordPress core security team lead)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003eImproper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.\u003c/span\u003e\u003cp\u003eThis issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.\u003c/p\u003e"
            }
          ],
          "value": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-01T08:35:39.048Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/wordpress/wordpress/wordpress/vulnerability/wordpress-wordpress-wordpress-6-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://wordpress.org/news/2025/09/wordpress-6-8-3-release/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
            }
          ],
          "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "tags": [
        "x_open-source"
      ],
      "title": "WordPress \u003c= 6.8.2 - (Author+) Cross Site Scripting (XSS) Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2025-58674",
    "datePublished": "2025-09-23T18:47:02.628Z",
    "dateReserved": "2025-09-03T09:03:46.831Z",
    "dateUpdated": "2025-10-01T08:35:39.048Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-58246 (GCVE-0-2025-58246)

Vulnerability from nvd – Published: 2025-09-23 17:17 – Updated: 2025-10-01 08:37 X_Open Source
VLAI?
Title
WordPress <= 6.8.2 - (Contributor+) Sensitive Data Exposure Vulnerability
Summary
Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it. This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
CWE
  • CWE-201 - Insertion of Sensitive Information Into Sent Data
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 6.8 , ≤ 6.8.2 (custom)
Affected: 6.7 , ≤ 6.7.3 (custom)
Affected: 6.6 , ≤ 6.6.3 (custom)
Affected: 6.5 , ≤ 6.5.6 (custom)
Affected: 6.4 , ≤ 6.4.6 (custom)
Affected: 6.3 , ≤ 6.3.6 (custom)
Affected: 6.2 , ≤ 6.2.7 (custom)
Affected: 6.1 , ≤ 6.1.8 (custom)
Affected: 6.0 , ≤ 6.0.10 (custom)
Affected: 5.9 , ≤ 5.9.11 (custom)
Affected: 5.8 , ≤ 5.8.11 (custom)
Affected: 5.7 , ≤ 5.7.13 (custom)
Affected: 5.6 , ≤ 5.6.15 (custom)
Affected: 5.5 , ≤ 5.5.16 (custom)
Affected: 5.4 , ≤ 5.4.17 (custom)
Affected: 5.3 , ≤ 5.3.19 (custom)
Affected: 5.2 , ≤ 5.2.22 (custom)
Affected: 5.1 , ≤ 5.1.20 (custom)
Affected: 5.0 , ≤ 5.0.23 (custom)
Affected: 4.9 , ≤ 4.9.27 (custom)
Affected: 4.8 , ≤ 4.8.26 (custom)
Affected: 4.7 , ≤ 4.7.30 (custom)
Create a notification for this product.
Credits
Abu Hurayra (Patchstack Bug Bounty Program) John Blackbourn (WordPress core security team lead) Timothy Jacobs Peter Wilson Mike Nelson
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-58246",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-23T18:30:39.501670Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-23T18:37:38.153Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "repo": "https://github.com/WordPress/WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.8.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.8.2",
              "status": "affected",
              "version": "6.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.7.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.7.3",
              "status": "affected",
              "version": "6.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.6.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.6.3",
              "status": "affected",
              "version": "6.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.5.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.5.6",
              "status": "affected",
              "version": "6.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.4.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.6",
              "status": "affected",
              "version": "6.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.3.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.6",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.7",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.9",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.1.8",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.11",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.10",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.11",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.8.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.8.11",
              "status": "affected",
              "version": "5.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.7.14",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.7.13",
              "status": "affected",
              "version": "5.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.6.16",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.6.15",
              "status": "affected",
              "version": "5.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.5.17",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.5.16",
              "status": "affected",
              "version": "5.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.4.18",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.4.17",
              "status": "affected",
              "version": "5.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.3.20",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.3.19",
              "status": "affected",
              "version": "5.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.2.23",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.2.22",
              "status": "affected",
              "version": "5.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.1.21",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.1.20",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.0.24",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.23",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.9.28",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.9.27",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.8.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.8.26",
              "status": "affected",
              "version": "4.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.7.31",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.7.30",
              "status": "affected",
              "version": "4.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Abu Hurayra (Patchstack Bug Bounty Program)"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "John Blackbourn (WordPress core security team lead)"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Timothy Jacobs"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Peter Wilson"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Mike Nelson"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eInsertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it.\u003c/span\u003e\u003cbr\u003e\u003cp\u003eThis issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.\u003c/p\u003e"
            }
          ],
          "value": "Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it.\nThis issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-37",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-37 Retrieve Embedded Sensitive Data"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-201",
              "description": "CWE-201 Insertion of Sensitive Information Into Sent Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-01T08:37:01.207Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/wordpress/wordpress/wordpress/vulnerability/wordpress-wordpress-wordpress-6-8-2-sensitive-data-exposure-vulnerability?_s_id=cve"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://wordpress.org/news/2025/09/wordpress-6-8-3-release/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
            }
          ],
          "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "tags": [
        "x_open-source"
      ],
      "title": "WordPress \u003c= 6.8.2 - (Contributor+) Sensitive Data Exposure Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2025-58246",
    "datePublished": "2025-09-23T17:17:12.399Z",
    "dateReserved": "2025-08-27T16:19:44.959Z",
    "dateUpdated": "2025-10-01T08:37:01.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-54352 (GCVE-0-2025-54352)

Vulnerability from nvd – Published: 2025-07-21 00:00 – Updated: 2025-07-21 18:15
VLAI?
Summary
WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior.
CWE
  • CWE-669 - Incorrect Resource Transfer Between Spheres
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 3.5 , ≤ 6.8.2 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54352",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-21T18:14:44.588087Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-21T18:15:20.785Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "lessThanOrEqual": "6.8.2",
              "status": "affected",
              "version": "3.5",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
                  "versionEndIncluding": "6.8.2",
                  "versionStartIncluding": "3.5",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-669",
              "description": "CWE-669 Incorrect Resource Transfer Between Spheres",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-21T04:27:10.814Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.imperva.com/blog/beware-a-threat-actor-could-steal-the-titles-of-your-private-and-draft-wordpress-posts/"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2025-54352",
    "datePublished": "2025-07-21T00:00:00.000Z",
    "dateReserved": "2025-07-21T00:00:00.000Z",
    "dateUpdated": "2025-07-21T18:15:20.785Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-4973 (GCVE-0-2022-4973)

Vulnerability from nvd – Published: 2024-10-16 06:43 – Updated: 2024-10-16 12:59
VLAI?
Title
WordPress Core < 6.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via use of the_meta(); function
Summary
WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
WordPress Foundation WordPress Affected: * , ≤ 3.6.1 (semver)
Affected: 3.7 , ≤ 3.7.38 (semver)
Affected: 3.8 , ≤ 3.8.38 (semver)
Affected: 3.9 , ≤ 3.9.36 (semver)
Affected: 4.0 , ≤ 4.0.35 (semver)
Affected: 4.1 , ≤ 4.1.35 (semver)
Affected: 4.2 , ≤ 4.2.32 (semver)
Affected: 4.3 , ≤ 4.3.28 (semver)
Affected: 4.4 , ≤ 4.4.27 (semver)
Affected: 4.5 , ≤ 4.5.26 (semver)
Affected: 4.6 , ≤ 4.6.23 (semver)
Affected: 4.7 , ≤ 4.7.23 (semver)
Affected: 4.8 , ≤ 4.8.19 (semver)
Affected: 4.9 , ≤ 4.9.20 (semver)
Affected: 5.0 , ≤ 5.0.16 (semver)
Affected: 5.1 , ≤ 5.1.13 (semver)
Affected: 5.2 , ≤ 5.2.15 (semver)
Affected: 5.3 , ≤ 5.3.12 (semver)
Affected: 5.4 , ≤ 5.4.10 (semver)
Affected: 5.5 , ≤ 5.5.9 (semver)
Affected: 5.6 , ≤ 5.6.8 (semver)
Affected: 5.7 , ≤ 5.7.6 (semver)
Affected: 5.8 , ≤ 5.8.4 (semver)
Affected: 5.9 , ≤ 5.9.3 (semver)
Affected: 6.0 , ≤ 6.0.1 (semver)
Create a notification for this product.
Credits
John Blackbourn
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-4973",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-16T12:59:16.874933Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-16T12:59:35.321Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress Foundation",
          "versions": [
            {
              "lessThanOrEqual": "3.6.1",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "3.7.38",
              "status": "affected",
              "version": "3.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "3.8.38",
              "status": "affected",
              "version": "3.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "3.9.36",
              "status": "affected",
              "version": "3.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.0.35",
              "status": "affected",
              "version": "4.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.1.35",
              "status": "affected",
              "version": "4.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.2.32",
              "status": "affected",
              "version": "4.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.3.28",
              "status": "affected",
              "version": "4.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.4.27",
              "status": "affected",
              "version": "4.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.5.26",
              "status": "affected",
              "version": "4.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.6.23",
              "status": "affected",
              "version": "4.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.7.23",
              "status": "affected",
              "version": "4.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.8.19",
              "status": "affected",
              "version": "4.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.20",
              "status": "affected",
              "version": "4.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.0.16",
              "status": "affected",
              "version": "5.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.1.13",
              "status": "affected",
              "version": "5.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.2.15",
              "status": "affected",
              "version": "5.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.3.12",
              "status": "affected",
              "version": "5.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.10",
              "status": "affected",
              "version": "5.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.5.9",
              "status": "affected",
              "version": "5.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.6.8",
              "status": "affected",
              "version": "5.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.7.6",
              "status": "affected",
              "version": "5.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.8.4",
              "status": "affected",
              "version": "5.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.9.3",
              "status": "affected",
              "version": "5.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.0.1",
              "status": "affected",
              "version": "6.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "John Blackbourn"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-16T06:43:41.734Z",
        "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
        "shortName": "Wordfence"
      },
      "references": [
        {
          "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset/53961"
        },
        {
          "url": "https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/"
        },
        {
          "url": "https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2022-08-30T00:00:00.000+00:00",
          "value": "Disclosed"
        }
      ],
      "title": "WordPress Core \u003c 6.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via use of the_meta(); function"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
    "assignerShortName": "Wordfence",
    "cveId": "CVE-2022-4973",
    "datePublished": "2024-10-16T06:43:41.734Z",
    "dateReserved": "2024-10-15T18:03:44.130Z",
    "dateUpdated": "2024-10-16T12:59:35.321Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-4439 (GCVE-0-2024-4439)

Vulnerability from nvd – Published: 2024-05-03 05:32 – Updated: 2024-08-01 20:40
VLAI?
Summary
WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.
Assigner
Impacted products
Vendor Product Version
WordPress Foundation WordPress Affected: 6.0 , ≤ 6.0.7 (semver)
Affected: 6.1 , ≤ 6.1.5 (semver)
Affected: 6.2 , ≤ 6.2.4 (semver)
Affected: 6.3 , ≤ 6.3.3 (semver)
Affected: 6.4 , ≤ 6.4.3 (semver)
Affected: 6.5 , ≤ 6.5.1 (semver)
Create a notification for this product.
Credits
John Blackbourn Matthew Rollings
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:wordpress:wordpress:6.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "wordpress",
            "vendor": "wordpress",
            "versions": [
              {
                "lessThanOrEqual": "6.5.1",
                "status": "affected",
                "version": "6.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-4439",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-09T19:37:57.427844Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-80",
                "description": "CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:54:08.655Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:40:47.361Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cve"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=57950%40%2F\u0026new=57950%40%2F\u0026sfp_email=\u0026sfph_mail=#file3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress Foundation",
          "versions": [
            {
              "lessThanOrEqual": "6.0.7",
              "status": "affected",
              "version": "6.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.5",
              "status": "affected",
              "version": "6.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.2.4",
              "status": "affected",
              "version": "6.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.3.3",
              "status": "affected",
              "version": "6.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.4.3",
              "status": "affected",
              "version": "6.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.1",
              "status": "affected",
              "version": "6.5",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "John Blackbourn"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Matthew Rollings"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author\u0027s avatar."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-03T05:32:34.988Z",
        "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
        "shortName": "Wordfence"
      },
      "references": [
        {
          "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cve"
        },
        {
          "url": "https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=57950%40%2F\u0026new=57950%40%2F\u0026sfp_email=\u0026sfph_mail=#file3"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php"
        },
        {
          "url": "https://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-04-09T00:00:00.000+00:00",
          "value": "Disclosed"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
    "assignerShortName": "Wordfence",
    "cveId": "CVE-2024-4439",
    "datePublished": "2024-05-03T05:32:34.988Z",
    "dateReserved": "2024-05-02T16:33:12.426Z",
    "dateUpdated": "2024-08-01T20:40:47.361Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-31211 (GCVE-0-2024-31211)

Vulnerability from nvd – Published: 2024-04-04 23:00 – Updated: 2024-08-02 01:46
VLAI?
Title
Remote Code Execution in `WP_HTML_Token`
Summary
WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.
CWE
  • CWE-502 - Deserialization of Untrusted Data
Assigner
References
Impacted products
Vendor Product Version
WordPress wordpress-develop Affected: >= 6.4.0 < 6.4.2
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-31211",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-05T14:00:20.723760Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:36:13.480Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T01:46:04.743Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "wordpress-develop",
          "vendor": "WordPress",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 6.4.0 \u003c 6.4.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502: Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-04T23:00:17.782Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653"
        }
      ],
      "source": {
        "advisory": "GHSA-m257-q4m5-j653",
        "discovery": "UNKNOWN"
      },
      "title": "Remote Code Execution in `WP_HTML_Token`"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-31211",
    "datePublished": "2024-04-04T23:00:17.782Z",
    "dateReserved": "2024-03-29T14:16:31.900Z",
    "dateUpdated": "2024-08-02T01:46:04.743Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-31210 (GCVE-0-2024-31210)

Vulnerability from nvd – Published: 2024-04-04 22:59 – Updated: 2024-08-02 01:46
VLAI?
Title
PHP file upload bypass via Plugin installer
Summary
WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.
CWE
  • CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
References
Impacted products
Vendor Product Version
WordPress wordpress-develop Affected: >= 6.4.0, < 6.4.3
Affected: >= 6.3.0, < 6.3.3
Affected: >= 6.2.0, < 6.2.4
Affected: >= 6.1.0, < 6.1.5
Affected: >= 6.0.0, < 6.0.7
Affected: >= 5.9.0, < 5.9.9
Affected: >= 5.8.0, < 5.8.9
Affected: >= 5.7.0, < 5.7.11
Affected: >= 5.6.0, < 5.6.13
Affected: >= 5.5.0, < 5.5.14
Affected: >= 5.4.0, < 5.4.15
Affected: >= 5.3.0, < 5.3.17
Affected: >= 5.2.0, < 5.2.20
Affected: >= 5.1.0, < 5.1.18
Affected: >= 5.0.0, < 5.0.21
Affected: >= 4.9.0, < 4.9.25
Affected: >= 4.8.0, < 4.8.24
Affected: >= 4.7.0, < 4.7.28
Affected: >= 4.6.0, < 4.6.28
Affected: >= 4.5.0, < 4.5.31
Affected: >= 4.4.0, < 4.4.32
Affected: >= 4.3.0, < 4.3.33
Affected: >= 4.2.0, < 4.2.37
Affected: < 4.1.40
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:wordpress:wordpress-develop:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "wordpress-develop",
            "vendor": "wordpress",
            "versions": [
              {
                "lessThan": "6.4.3",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-31210",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-05T13:59:35.660459Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-31T19:47:42.302Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T01:46:04.580Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "wordpress-develop",
          "vendor": "WordPress",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 6.4.0, \u003c 6.4.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.3.0, \u003c 6.3.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.2.0, \u003c 6.2.4"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.1.0, \u003c 6.1.5"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.0.0, \u003c 6.0.7"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.9.0, \u003c 5.9.9"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.8.0, \u003c 5.8.9"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.7.0, \u003c 5.7.11"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.6.0, \u003c 5.6.13"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.5.0, \u003c 5.5.14"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.4.0, \u003c 5.4.15"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.3.0, \u003c 5.3.17"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.2.0, \u003c 5.2.20"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.1.0, \u003c 5.1.18"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.0.0, \u003c 5.0.21"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.9.0, \u003c 4.9.25"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.8.0, \u003c 4.8.24"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.7.0, \u003c 4.7.28"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.6.0, \u003c 4.6.28"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.5.0, \u003c 4.5.31"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.4.0, \u003c 4.4.32"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.3.0, \u003c 4.3.33"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.2.0, \u003c 4.2.37"
            },
            {
              "status": "affected",
              "version": "\u003c 4.1.40"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress is an open publishing platform for the Web. It\u0027s possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -\u003e Add New -\u003e Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it\u0027s otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-434",
              "description": "CWE-434: Unrestricted Upload of File with Dangerous Type",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-04T22:59:28.955Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r"
        }
      ],
      "source": {
        "advisory": "GHSA-x79f-xrjv-jx5r",
        "discovery": "UNKNOWN"
      },
      "title": "PHP file upload bypass via Plugin installer"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-31210",
    "datePublished": "2024-04-04T22:59:28.955Z",
    "dateReserved": "2024-03-29T14:16:31.900Z",
    "dateUpdated": "2024-08-02T01:46:04.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5561 (GCVE-0-2023-5561)

Vulnerability from nvd – Published: 2023-10-16 19:39 – Updated: 2025-04-23 16:12
VLAI?
Title
WordPress < 6.3.2 - Unauthenticated Post Author Email Disclosure
Summary
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 6.3.0 , < 6.3.2 (semver)
Affected: 6.2.0 , < 6.2.3 (semver)
Affected: 6.1.0 , < 6.1.4 (semver)
Affected: 6.0.0 , < 6.0.6 (semver)
Affected: 5.9.0 , < 5.9.8 (semver)
Affected: 5.8.0 , < 5.8.8 (semver)
Affected: 5.7.0 , < 5.7.10 (semver)
Affected: 5.6.0 , < 5.6.12 (semver)
Affected: 5.5.0 , < 5.5.13 (semver)
Affected: 5.4.0 , < 5.4.14 (semver)
Affected: 5.3.0 , < 5.3.16 (semver)
Affected: 5.2.0 , < 5.2.19 (semver)
Affected: 5.0.0 , < 5.0.20 (semver)
Affected: 4.9.0 , < 4.9.24 (semver)
Affected: 4.8.0 , < 4.8.23 (semver)
Affected: 4.7.0 , < 4.7.27 (semver)
Create a notification for this product.
Credits
Marc Montpas WPScan
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:59:44.898Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "exploit",
              "vdb-entry",
              "technical-description",
              "x_transferred"
            ],
            "url": "https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441"
          },
          {
            "tags": [
              "technical-description",
              "x_transferred"
            ],
            "url": "https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-5561",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-23T16:07:50.654852Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-23T16:12:25.833Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "lessThan": "6.3.2",
              "status": "affected",
              "version": "6.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.2.3",
              "status": "affected",
              "version": "6.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.1.4",
              "status": "affected",
              "version": "6.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.0.6",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.9.8",
              "status": "affected",
              "version": "5.9.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.8.8",
              "status": "affected",
              "version": "5.8.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.7.10",
              "status": "affected",
              "version": "5.7.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.6.12",
              "status": "affected",
              "version": "5.6.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.5.13",
              "status": "affected",
              "version": "5.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.4.14",
              "status": "affected",
              "version": "5.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.3.16",
              "status": "affected",
              "version": "5.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.2.19",
              "status": "affected",
              "version": "5.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.0.20",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.9.24",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.8.23",
              "status": "affected",
              "version": "4.8.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.7.27",
              "status": "affected",
              "version": "4.7.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Marc Montpas"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "WPScan"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-20T23:06:10.636Z",
        "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
        "shortName": "WPScan"
      },
      "references": [
        {
          "tags": [
            "exploit",
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441"
        },
        {
          "tags": [
            "technical-description"
          ],
          "url": "https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "WordPress \u003c 6.3.2 - Unauthenticated Post Author Email Disclosure",
      "x_generator": {
        "engine": "WPScan CVE Generator"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
    "assignerShortName": "WPScan",
    "cveId": "CVE-2023-5561",
    "datePublished": "2023-10-16T19:39:10.424Z",
    "dateReserved": "2023-10-12T17:42:19.461Z",
    "dateUpdated": "2025-04-23T16:12:25.833Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-39999 (GCVE-0-2023-39999)

Vulnerability from nvd – Published: 2023-10-13 11:31 – Updated: 2025-02-13 17:03
VLAI?
Title
WordPress < 6.3.2 is vulnerable to Broken Access Control
Summary
Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
Impacted products
Vendor Product Version
WordPress.org WordPress Affected: 6.3 , ≤ 6.3.1 (custom)
Affected: 6.2 , ≤ 6.2.2 (custom)
Affected: 6.1 , ≤ 6.13 (custom)
Affected: 6.0 , ≤ 6.0.5 (custom)
Affected: 5.9 , ≤ 5.9.7 (custom)
Affected: 5.8 , ≤ 5.8.7 (custom)
Affected: 5.7 , ≤ 5.7.9 (custom)
Affected: 5.6 , ≤ 5.6.11 (custom)
Affected: 5.5 , ≤ 5.5.12 (custom)
Affected: 5.4 , ≤ 5.4.13 (custom)
Affected: 5.3 , ≤ 5.3.15 (custom)
Affected: 5.2 , ≤ 5.2.18 (custom)
Affected: 5.1 , ≤ 5.1.16 (custom)
Affected: 5.0 , ≤ 5.0.19 (custom)
Affected: 4.9 , ≤ 4.9.23 (custom)
Affected: 4.8 , ≤ 4.8.22 (custom)
Affected: 4.7 , ≤ 4.7.26 (custom)
Affected: 4.6 , ≤ 4.6.26 (custom)
Affected: 4.5 , ≤ 4.5.29 (custom)
Affected: 4.4 , ≤ 4.4.30 (custom)
Affected: 4.3 , ≤ 4.3.31 (custom)
Affected: 4.2 , ≤ 4.2.35 (custom)
Affected: 4.1 , ≤ 4.1.38 (custom)
Create a notification for this product.
Credits
Rafie Muhammad (Patchstack) Jb Audras (WordPress Security Team)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:18:10.210Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
          },
          {
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress.org",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.3.2",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.1",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.2",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.13",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.6",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.5",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.7",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.8.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.8.7",
              "status": "affected",
              "version": "5.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.7.10",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.7.9",
              "status": "affected",
              "version": "5.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.6.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.6.11",
              "status": "affected",
              "version": "5.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.5.13",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.5.12",
              "status": "affected",
              "version": "5.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.4.14",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.4.13",
              "status": "affected",
              "version": "5.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.3.16",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.3.15",
              "status": "affected",
              "version": "5.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.2.19",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.2.18",
              "status": "affected",
              "version": "5.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.1.17",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.1.16",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.0.20",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.19",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.9.24",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.9.23",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.8.23",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.8.22",
              "status": "affected",
              "version": "4.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.7.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.7.26",
              "status": "affected",
              "version": "4.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.6.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.6.26",
              "status": "affected",
              "version": "4.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.5.30",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.5.29",
              "status": "affected",
              "version": "4.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.4.31",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.4.30",
              "status": "affected",
              "version": "4.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.3.32",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.3.31",
              "status": "affected",
              "version": "4.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.2.36",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.2.35",
              "status": "affected",
              "version": "4.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.1.39",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.1.38",
              "status": "affected",
              "version": "4.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Rafie Muhammad (Patchstack)"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Jb Audras (WordPress Security Team)"
        }
      ],
      "datePublic": "2023-10-13T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Exposure of Sensitive Information to an Unauthorized Actor in WordPress\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.\u003c/span\u003e"
            }
          ],
          "value": "Exposure of Sensitive Information to an Unauthorized Actor in WordPress\u00a0from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-1",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-20T23:06:12.283Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
        },
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update to suitable (6.3.2,\u0026nbsp;6.2.3, 6.1.4, 6.0.6, 5.9.8, 5.8.8, 5.7.10, 5.6.12, 5.5.13, 5.4.14, 5.3.16, 5.2.19, 5.1.17, 5.0.20, 4.9.24, 4.8.23, 4.7.27, 4.6.27, 4.5.30, 4.4.31, 4.3.32, 4.2.36, 4.1.39) or a higher version."
            }
          ],
          "value": "Update to suitable (6.3.2,\u00a06.2.3, 6.1.4, 6.0.6, 5.9.8, 5.8.8, 5.7.10, 5.6.12, 5.5.13, 5.4.14, 5.3.16, 5.2.19, 5.1.17, 5.0.20, 4.9.24, 4.8.23, 4.7.27, 4.6.27, 4.5.30, 4.4.31, 4.3.32, 4.2.36, 4.1.39) or a higher version."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "WordPress \u003c 6.3.2 is vulnerable to Broken Access Control",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2023-39999",
    "datePublished": "2023-10-13T11:31:16.977Z",
    "dateReserved": "2023-08-08T11:43:05.859Z",
    "dateUpdated": "2025-02-13T17:03:20.665Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-38000 (GCVE-0-2023-38000)

Vulnerability from nvd – Published: 2023-10-13 09:55 – Updated: 2024-08-02 17:23
VLAI?
Title
Auth. Stored Cross-Site Scripting (XSS) vulnerability in WordPress core and Gutenberg plugin via Navigation Links Block
Summary
Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
WordPress.org WordPress Affected: 6.3 , ≤ 6.3.1 (custom)
Affected: 6.2 , ≤ 6.2.2 (custom)
Affected: 6.1 , ≤ 6.1.3 (custom)
Affected: 6.0 , ≤ 6.0.5 (custom)
Affected: 5.9 , ≤ 5.9.7 (custom)
Create a notification for this product.
    Gutenberg Team Gutenberg Affected: n/a , ≤ 16.8.0 (custom)
Create a notification for this product.
Credits
Rafie Muhammad (Patchstack) Edouard Lamoine (Patchstack)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T17:23:27.829Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
          },
          {
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-core-6-3-2-contributor-stored-xss-in-navigation-links-block-vulnerability?_s_id=cve"
          },
          {
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "https://patchstack.com/database/vulnerability/gutenberg/wordpress-gutenberg-plugin-16-8-0-contributor-stored-xss-in-navigation-links-block-vulnerability?_s_id=cve"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress.org",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.3.2",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.1",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.2",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.1.3",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.6",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.5",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.7",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            }
          ]
        },
        {
          "collectionURL": "https://wordpress.org/plugins",
          "defaultStatus": "unaffected",
          "packageName": "gutenberg",
          "product": "Gutenberg",
          "vendor": "Gutenberg Team",
          "versions": [
            {
              "changes": [
                {
                  "at": "16.8.1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "16.8.0",
              "status": "affected",
              "version": "n/a",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Rafie Muhammad (Patchstack)"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Edouard Lamoine (Patchstack)"
        }
      ],
      "datePublic": "2023-10-13T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003e6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin \u0026lt;= 16.8.0 versions.\u003c/span\u003e"
            }
          ],
          "value": "Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core\u00a06.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin \u003c= 16.8.0 versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-13T10:34:00.870Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
        },
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-core-6-3-2-contributor-stored-xss-in-navigation-links-block-vulnerability?_s_id=cve"
        },
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/vulnerability/gutenberg/wordpress-gutenberg-plugin-16-8-0-contributor-stored-xss-in-navigation-links-block-vulnerability?_s_id=cve"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update WordPress core to the 6.3.2,\u0026nbsp;6.2.3,\u0026nbsp;6.1.4,\u0026nbsp;6.0.6,\u0026nbsp;5.9.8 or a higher version."
            }
          ],
          "value": "Update WordPress core to the 6.3.2,\u00a06.2.3,\u00a06.1.4,\u00a06.0.6,\u00a05.9.8 or a higher version."
        },
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update\u0026nbsp;Gutenberg to\u0026nbsp;16.8.1 or a higher version."
            }
          ],
          "value": "Update\u00a0Gutenberg to\u00a016.8.1 or a higher version."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Auth. Stored Cross-Site Scripting (XSS) vulnerability in WordPress core and Gutenberg plugin via Navigation Links Block",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2023-38000",
    "datePublished": "2023-10-13T09:55:54.690Z",
    "dateReserved": "2023-07-11T12:50:13.630Z",
    "dateUpdated": "2024-08-02T17:23:27.829Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-2745 (GCVE-0-2023-2745)

Vulnerability from nvd – Published: 2023-05-17 08:36 – Updated: 2025-04-24 18:22
VLAI?
Summary
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
Assigner
Impacted products
Vendor Product Version
WordPress Foundation WordPress Affected: * , ≤ 4.1 (semver)
Affected: 4.1 , < 4.1.38 (semver)
Affected: 4.2 , < 4.2.35 (semver)
Affected: 4.3 , < 4.3.31 (semver)
Affected: 4.4 , < 4.4.30 (semver)
Affected: 4.5 , < 4.5.29 (semver)
Affected: 4.6 , < 4.6.26 (semver)
Affected: 4.7 , < 4.7.26 (semver)
Affected: 4.8 , < 4.8.22 (semver)
Affected: 4.9 , < 4.9.23 (semver)
Affected: 5.0 , < 5.0.19 (semver)
Affected: 5.1 , < 5.1.16 (semver)
Affected: 5.2 , < 5.2.18 (semver)
Affected: 5.3 , < 5.3.15 (semver)
Affected: 5.4 , < 5.4.13 (semver)
Affected: 5.5 , < 5.5.12 (semver)
Affected: 5.6 , < 5.6.11 (semver)
Affected: 5.7 , < 5.7.9 (semver)
Affected: 5.8 , < 5.8.7 (semver)
Affected: 5.9 , < 5.9.6 (semver)
Affected: 6.0 , < 6.0.4 (semver)
Affected: 6.1 , < 6.1.2 (semver)
Affected: 6.2 , < 6.2.1 (semver)
Create a notification for this product.
Credits
Ramuel Gall Matt Rusnak
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-04-24T18:22:33.536Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://www.exploit-db.com/exploits/52274"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=55765%40%2F\u0026new=55765%40%2F\u0026sfp_email=\u0026sfph_mail="
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html"
          }
        ],
        "title": "CVE Program Container",
        "x_generator": {
          "engine": "ADPogram 0.0.1"
        }
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-2745",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-13T16:22:24.483760Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-13T16:49:16.213Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress Foundation",
          "versions": [
            {
              "lessThanOrEqual": "4.1",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            },
            {
              "lessThan": "4.1.38",
              "status": "affected",
              "version": "4.1",
              "versionType": "semver"
            },
            {
              "lessThan": "4.2.35",
              "status": "affected",
              "version": "4.2",
              "versionType": "semver"
            },
            {
              "lessThan": "4.3.31",
              "status": "affected",
              "version": "4.3",
              "versionType": "semver"
            },
            {
              "lessThan": "4.4.30",
              "status": "affected",
              "version": "4.4",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.29",
              "status": "affected",
              "version": "4.5",
              "versionType": "semver"
            },
            {
              "lessThan": "4.6.26",
              "status": "affected",
              "version": "4.6",
              "versionType": "semver"
            },
            {
              "lessThan": "4.7.26",
              "status": "affected",
              "version": "4.7",
              "versionType": "semver"
            },
            {
              "lessThan": "4.8.22",
              "status": "affected",
              "version": "4.8",
              "versionType": "semver"
            },
            {
              "lessThan": "4.9.23",
              "status": "affected",
              "version": "4.9",
              "versionType": "semver"
            },
            {
              "lessThan": "5.0.19",
              "status": "affected",
              "version": "5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.1.16",
              "status": "affected",
              "version": "5.1",
              "versionType": "semver"
            },
            {
              "lessThan": "5.2.18",
              "status": "affected",
              "version": "5.2",
              "versionType": "semver"
            },
            {
              "lessThan": "5.3.15",
              "status": "affected",
              "version": "5.3",
              "versionType": "semver"
            },
            {
              "lessThan": "5.4.13",
              "status": "affected",
              "version": "5.4",
              "versionType": "semver"
            },
            {
              "lessThan": "5.5.12",
              "status": "affected",
              "version": "5.5",
              "versionType": "semver"
            },
            {
              "lessThan": "5.6.11",
              "status": "affected",
              "version": "5.6",
              "versionType": "semver"
            },
            {
              "lessThan": "5.7.9",
              "status": "affected",
              "version": "5.7",
              "versionType": "semver"
            },
            {
              "lessThan": "5.8.7",
              "status": "affected",
              "version": "5.8",
              "versionType": "semver"
            },
            {
              "lessThan": "5.9.6",
              "status": "affected",
              "version": "5.9",
              "versionType": "semver"
            },
            {
              "lessThan": "6.0.4",
              "status": "affected",
              "version": "6.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.1.2",
              "status": "affected",
              "version": "6.1",
              "versionType": "semver"
            },
            {
              "lessThan": "6.2.1",
              "status": "affected",
              "version": "6.2",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ramuel Gall"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Matt Rusnak"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the \u2018wp_lang\u2019 parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-21T00:06:14.619Z",
        "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
        "shortName": "Wordfence"
      },
      "references": [
        {
          "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve"
        },
        {
          "url": "https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=55765%40%2F\u0026new=55765%40%2F\u0026sfp_email=\u0026sfph_mail="
        },
        {
          "url": "http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2023-05-16T00:00:00.000+00:00",
          "value": "Disclosed"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
    "assignerShortName": "Wordfence",
    "cveId": "CVE-2023-2745",
    "datePublished": "2023-05-17T08:36:44.034Z",
    "dateReserved": "2023-05-16T19:53:02.398Z",
    "dateUpdated": "2025-04-24T18:22:33.536Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-22622 (GCVE-0-2023-22622)

Vulnerability from nvd – Published: 2023-01-05 00:00 – Updated: 2025-04-07 18:38
VLAI?
Summary
WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:13:49.462Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://medium.com/%40thecpanelguy/the-nightmare-that-is-wpcron-php-ae31c1d3ae30"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tenable.com/plugins/was/113449"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/WordPress/WordPress/blob/dca7b5204b5fea54e6d1774689777b359a9222ab/wp-cron.php#L5-L8"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://developer.wordpress.org/plugins/cron/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://wordpress.org/about/security/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://wordpress.org/support/article/how-to-install-wordpress/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://patchstack.com/articles/solving-unpredictable-wp-cron-problems-addressing-cve-2023-22622/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 5.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-22622",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T18:06:54.772691Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T18:38:53.181Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes \"the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner,\" but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-02-01T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://medium.com/%40thecpanelguy/the-nightmare-that-is-wpcron-php-ae31c1d3ae30"
        },
        {
          "url": "https://www.tenable.com/plugins/was/113449"
        },
        {
          "url": "https://github.com/WordPress/WordPress/blob/dca7b5204b5fea54e6d1774689777b359a9222ab/wp-cron.php#L5-L8"
        },
        {
          "url": "https://developer.wordpress.org/plugins/cron/"
        },
        {
          "url": "https://wordpress.org/about/security/"
        },
        {
          "url": "https://wordpress.org/support/article/how-to-install-wordpress/"
        },
        {
          "url": "https://patchstack.com/articles/solving-unpredictable-wp-cron-problems-addressing-cve-2023-22622/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-22622",
    "datePublished": "2023-01-05T00:00:00.000Z",
    "dateReserved": "2023-01-05T00:00:00.000Z",
    "dateUpdated": "2025-04-07T18:38:53.181Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-58674 (GCVE-0-2025-58674)

Vulnerability from cvelistv5 – Published: 2025-09-23 18:47 – Updated: 2025-10-01 08:35 X_Open Source
VLAI?
Title
WordPress <= 6.8.2 - (Author+) Cross Site Scripting (XSS) Vulnerability
Summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 6.8 , ≤ 6.8.2 (custom)
Affected: 6.7 , ≤ 6.7.3 (custom)
Affected: 6.6 , ≤ 6.6.3 (custom)
Affected: 6.5 , ≤ 6.5.6 (custom)
Affected: 6.4 , ≤ 6.4.6 (custom)
Affected: 6.3 , ≤ 6.3.6 (custom)
Affected: 6.2 , ≤ 6.2.7 (custom)
Affected: 6.1 , ≤ 6.1.8 (custom)
Affected: 6.0 , ≤ 6.0.10 (custom)
Affected: 5.9 , ≤ 5.9.11 (custom)
Affected: 5.8 , ≤ 5.8.11 (custom)
Affected: 5.7 , ≤ 5.7.13 (custom)
Affected: 5.6 , ≤ 5.6.15 (custom)
Affected: 5.5 , ≤ 5.5.16 (custom)
Affected: 5.4 , ≤ 5.4.17 (custom)
Affected: 5.3 , ≤ 5.3.19 (custom)
Affected: 5.2 , ≤ 5.2.22 (custom)
Affected: 5.1 , ≤ 5.1.20 (custom)
Affected: 5.0 , ≤ 5.0.23 (custom)
Affected: 4.9 , ≤ 4.9.27 (custom)
Affected: 4.8 , ≤ 4.8.26 (custom)
Affected: 4.7 , ≤ 4.7.30 (custom)
Create a notification for this product.
Credits
savphill (Patchstack Bug Bounty Program) John Blackbourn (WordPress core security team lead)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-58674",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-23T19:15:09.886956Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-23T19:17:35.099Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "repo": "https://github.com/WordPress/WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.8.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.8.2",
              "status": "affected",
              "version": "6.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.7.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.7.3",
              "status": "affected",
              "version": "6.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.6.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.6.3",
              "status": "affected",
              "version": "6.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.5.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.5.6",
              "status": "affected",
              "version": "6.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.4.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.6",
              "status": "affected",
              "version": "6.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.3.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.6",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.7",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.9",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.1.8",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.11",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.10",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.11",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.8.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.8.11",
              "status": "affected",
              "version": "5.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.7.14",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.7.13",
              "status": "affected",
              "version": "5.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.6.16",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.6.15",
              "status": "affected",
              "version": "5.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.5.17",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.5.16",
              "status": "affected",
              "version": "5.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.4.18",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.4.17",
              "status": "affected",
              "version": "5.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.3.20",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.3.19",
              "status": "affected",
              "version": "5.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.2.23",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.2.22",
              "status": "affected",
              "version": "5.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.1.21",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.1.20",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.0.24",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.23",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.9.28",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.9.27",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.8.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.8.26",
              "status": "affected",
              "version": "4.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.7.31",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.7.30",
              "status": "affected",
              "version": "4.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "savphill (Patchstack Bug Bounty Program)"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "John Blackbourn (WordPress core security team lead)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003eImproper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.\u003c/span\u003e\u003cp\u003eThis issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.\u003c/p\u003e"
            }
          ],
          "value": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-01T08:35:39.048Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/wordpress/wordpress/wordpress/vulnerability/wordpress-wordpress-wordpress-6-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://wordpress.org/news/2025/09/wordpress-6-8-3-release/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
            }
          ],
          "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "tags": [
        "x_open-source"
      ],
      "title": "WordPress \u003c= 6.8.2 - (Author+) Cross Site Scripting (XSS) Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2025-58674",
    "datePublished": "2025-09-23T18:47:02.628Z",
    "dateReserved": "2025-09-03T09:03:46.831Z",
    "dateUpdated": "2025-10-01T08:35:39.048Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-58246 (GCVE-0-2025-58246)

Vulnerability from cvelistv5 – Published: 2025-09-23 17:17 – Updated: 2025-10-01 08:37 X_Open Source
VLAI?
Title
WordPress <= 6.8.2 - (Contributor+) Sensitive Data Exposure Vulnerability
Summary
Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it. This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
CWE
  • CWE-201 - Insertion of Sensitive Information Into Sent Data
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 6.8 , ≤ 6.8.2 (custom)
Affected: 6.7 , ≤ 6.7.3 (custom)
Affected: 6.6 , ≤ 6.6.3 (custom)
Affected: 6.5 , ≤ 6.5.6 (custom)
Affected: 6.4 , ≤ 6.4.6 (custom)
Affected: 6.3 , ≤ 6.3.6 (custom)
Affected: 6.2 , ≤ 6.2.7 (custom)
Affected: 6.1 , ≤ 6.1.8 (custom)
Affected: 6.0 , ≤ 6.0.10 (custom)
Affected: 5.9 , ≤ 5.9.11 (custom)
Affected: 5.8 , ≤ 5.8.11 (custom)
Affected: 5.7 , ≤ 5.7.13 (custom)
Affected: 5.6 , ≤ 5.6.15 (custom)
Affected: 5.5 , ≤ 5.5.16 (custom)
Affected: 5.4 , ≤ 5.4.17 (custom)
Affected: 5.3 , ≤ 5.3.19 (custom)
Affected: 5.2 , ≤ 5.2.22 (custom)
Affected: 5.1 , ≤ 5.1.20 (custom)
Affected: 5.0 , ≤ 5.0.23 (custom)
Affected: 4.9 , ≤ 4.9.27 (custom)
Affected: 4.8 , ≤ 4.8.26 (custom)
Affected: 4.7 , ≤ 4.7.30 (custom)
Create a notification for this product.
Credits
Abu Hurayra (Patchstack Bug Bounty Program) John Blackbourn (WordPress core security team lead) Timothy Jacobs Peter Wilson Mike Nelson
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-58246",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-23T18:30:39.501670Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-23T18:37:38.153Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "repo": "https://github.com/WordPress/WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.8.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.8.2",
              "status": "affected",
              "version": "6.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.7.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.7.3",
              "status": "affected",
              "version": "6.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.6.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.6.3",
              "status": "affected",
              "version": "6.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.5.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.5.6",
              "status": "affected",
              "version": "6.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.4.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.6",
              "status": "affected",
              "version": "6.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.3.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.6",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.7",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.9",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.1.8",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.11",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.10",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.11",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.8.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.8.11",
              "status": "affected",
              "version": "5.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.7.14",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.7.13",
              "status": "affected",
              "version": "5.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.6.16",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.6.15",
              "status": "affected",
              "version": "5.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.5.17",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.5.16",
              "status": "affected",
              "version": "5.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.4.18",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.4.17",
              "status": "affected",
              "version": "5.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.3.20",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.3.19",
              "status": "affected",
              "version": "5.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.2.23",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.2.22",
              "status": "affected",
              "version": "5.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.1.21",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.1.20",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.0.24",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.23",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.9.28",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.9.27",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.8.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.8.26",
              "status": "affected",
              "version": "4.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.7.31",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.7.30",
              "status": "affected",
              "version": "4.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Abu Hurayra (Patchstack Bug Bounty Program)"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "John Blackbourn (WordPress core security team lead)"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Timothy Jacobs"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Peter Wilson"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Mike Nelson"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eInsertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it.\u003c/span\u003e\u003cbr\u003e\u003cp\u003eThis issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.\u003c/p\u003e"
            }
          ],
          "value": "Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it.\nThis issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-37",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-37 Retrieve Embedded Sensitive Data"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-201",
              "description": "CWE-201 Insertion of Sensitive Information Into Sent Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-01T08:37:01.207Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/wordpress/wordpress/wordpress/vulnerability/wordpress-wordpress-wordpress-6-8-2-sensitive-data-exposure-vulnerability?_s_id=cve"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://wordpress.org/news/2025/09/wordpress-6-8-3-release/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
            }
          ],
          "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "tags": [
        "x_open-source"
      ],
      "title": "WordPress \u003c= 6.8.2 - (Contributor+) Sensitive Data Exposure Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2025-58246",
    "datePublished": "2025-09-23T17:17:12.399Z",
    "dateReserved": "2025-08-27T16:19:44.959Z",
    "dateUpdated": "2025-10-01T08:37:01.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-54352 (GCVE-0-2025-54352)

Vulnerability from cvelistv5 – Published: 2025-07-21 00:00 – Updated: 2025-07-21 18:15
VLAI?
Summary
WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior.
CWE
  • CWE-669 - Incorrect Resource Transfer Between Spheres
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 3.5 , ≤ 6.8.2 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54352",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-21T18:14:44.588087Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-21T18:15:20.785Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "lessThanOrEqual": "6.8.2",
              "status": "affected",
              "version": "3.5",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
                  "versionEndIncluding": "6.8.2",
                  "versionStartIncluding": "3.5",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-669",
              "description": "CWE-669 Incorrect Resource Transfer Between Spheres",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-21T04:27:10.814Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.imperva.com/blog/beware-a-threat-actor-could-steal-the-titles-of-your-private-and-draft-wordpress-posts/"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2025-54352",
    "datePublished": "2025-07-21T00:00:00.000Z",
    "dateReserved": "2025-07-21T00:00:00.000Z",
    "dateUpdated": "2025-07-21T18:15:20.785Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-4973 (GCVE-0-2022-4973)

Vulnerability from cvelistv5 – Published: 2024-10-16 06:43 – Updated: 2024-10-16 12:59
VLAI?
Title
WordPress Core < 6.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via use of the_meta(); function
Summary
WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
WordPress Foundation WordPress Affected: * , ≤ 3.6.1 (semver)
Affected: 3.7 , ≤ 3.7.38 (semver)
Affected: 3.8 , ≤ 3.8.38 (semver)
Affected: 3.9 , ≤ 3.9.36 (semver)
Affected: 4.0 , ≤ 4.0.35 (semver)
Affected: 4.1 , ≤ 4.1.35 (semver)
Affected: 4.2 , ≤ 4.2.32 (semver)
Affected: 4.3 , ≤ 4.3.28 (semver)
Affected: 4.4 , ≤ 4.4.27 (semver)
Affected: 4.5 , ≤ 4.5.26 (semver)
Affected: 4.6 , ≤ 4.6.23 (semver)
Affected: 4.7 , ≤ 4.7.23 (semver)
Affected: 4.8 , ≤ 4.8.19 (semver)
Affected: 4.9 , ≤ 4.9.20 (semver)
Affected: 5.0 , ≤ 5.0.16 (semver)
Affected: 5.1 , ≤ 5.1.13 (semver)
Affected: 5.2 , ≤ 5.2.15 (semver)
Affected: 5.3 , ≤ 5.3.12 (semver)
Affected: 5.4 , ≤ 5.4.10 (semver)
Affected: 5.5 , ≤ 5.5.9 (semver)
Affected: 5.6 , ≤ 5.6.8 (semver)
Affected: 5.7 , ≤ 5.7.6 (semver)
Affected: 5.8 , ≤ 5.8.4 (semver)
Affected: 5.9 , ≤ 5.9.3 (semver)
Affected: 6.0 , ≤ 6.0.1 (semver)
Create a notification for this product.
Credits
John Blackbourn
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-4973",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-16T12:59:16.874933Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-16T12:59:35.321Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress Foundation",
          "versions": [
            {
              "lessThanOrEqual": "3.6.1",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "3.7.38",
              "status": "affected",
              "version": "3.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "3.8.38",
              "status": "affected",
              "version": "3.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "3.9.36",
              "status": "affected",
              "version": "3.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.0.35",
              "status": "affected",
              "version": "4.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.1.35",
              "status": "affected",
              "version": "4.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.2.32",
              "status": "affected",
              "version": "4.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.3.28",
              "status": "affected",
              "version": "4.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.4.27",
              "status": "affected",
              "version": "4.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.5.26",
              "status": "affected",
              "version": "4.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.6.23",
              "status": "affected",
              "version": "4.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.7.23",
              "status": "affected",
              "version": "4.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.8.19",
              "status": "affected",
              "version": "4.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.20",
              "status": "affected",
              "version": "4.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.0.16",
              "status": "affected",
              "version": "5.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.1.13",
              "status": "affected",
              "version": "5.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.2.15",
              "status": "affected",
              "version": "5.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.3.12",
              "status": "affected",
              "version": "5.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.10",
              "status": "affected",
              "version": "5.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.5.9",
              "status": "affected",
              "version": "5.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.6.8",
              "status": "affected",
              "version": "5.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.7.6",
              "status": "affected",
              "version": "5.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.8.4",
              "status": "affected",
              "version": "5.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.9.3",
              "status": "affected",
              "version": "5.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.0.1",
              "status": "affected",
              "version": "6.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "John Blackbourn"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-16T06:43:41.734Z",
        "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
        "shortName": "Wordfence"
      },
      "references": [
        {
          "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset/53961"
        },
        {
          "url": "https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/"
        },
        {
          "url": "https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2022-08-30T00:00:00.000+00:00",
          "value": "Disclosed"
        }
      ],
      "title": "WordPress Core \u003c 6.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via use of the_meta(); function"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
    "assignerShortName": "Wordfence",
    "cveId": "CVE-2022-4973",
    "datePublished": "2024-10-16T06:43:41.734Z",
    "dateReserved": "2024-10-15T18:03:44.130Z",
    "dateUpdated": "2024-10-16T12:59:35.321Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-4439 (GCVE-0-2024-4439)

Vulnerability from cvelistv5 – Published: 2024-05-03 05:32 – Updated: 2024-08-01 20:40
VLAI?
Summary
WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.
Assigner
Impacted products
Vendor Product Version
WordPress Foundation WordPress Affected: 6.0 , ≤ 6.0.7 (semver)
Affected: 6.1 , ≤ 6.1.5 (semver)
Affected: 6.2 , ≤ 6.2.4 (semver)
Affected: 6.3 , ≤ 6.3.3 (semver)
Affected: 6.4 , ≤ 6.4.3 (semver)
Affected: 6.5 , ≤ 6.5.1 (semver)
Create a notification for this product.
Credits
John Blackbourn Matthew Rollings
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:wordpress:wordpress:6.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "wordpress",
            "vendor": "wordpress",
            "versions": [
              {
                "lessThanOrEqual": "6.5.1",
                "status": "affected",
                "version": "6.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-4439",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-09T19:37:57.427844Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-80",
                "description": "CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:54:08.655Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:40:47.361Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cve"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=57950%40%2F\u0026new=57950%40%2F\u0026sfp_email=\u0026sfph_mail=#file3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress Foundation",
          "versions": [
            {
              "lessThanOrEqual": "6.0.7",
              "status": "affected",
              "version": "6.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.5",
              "status": "affected",
              "version": "6.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.2.4",
              "status": "affected",
              "version": "6.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.3.3",
              "status": "affected",
              "version": "6.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.4.3",
              "status": "affected",
              "version": "6.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.1",
              "status": "affected",
              "version": "6.5",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "John Blackbourn"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Matthew Rollings"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author\u0027s avatar."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-03T05:32:34.988Z",
        "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
        "shortName": "Wordfence"
      },
      "references": [
        {
          "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cve"
        },
        {
          "url": "https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=57950%40%2F\u0026new=57950%40%2F\u0026sfp_email=\u0026sfph_mail=#file3"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php"
        },
        {
          "url": "https://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-04-09T00:00:00.000+00:00",
          "value": "Disclosed"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
    "assignerShortName": "Wordfence",
    "cveId": "CVE-2024-4439",
    "datePublished": "2024-05-03T05:32:34.988Z",
    "dateReserved": "2024-05-02T16:33:12.426Z",
    "dateUpdated": "2024-08-01T20:40:47.361Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-31211 (GCVE-0-2024-31211)

Vulnerability from cvelistv5 – Published: 2024-04-04 23:00 – Updated: 2024-08-02 01:46
VLAI?
Title
Remote Code Execution in `WP_HTML_Token`
Summary
WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.
CWE
  • CWE-502 - Deserialization of Untrusted Data
Assigner
References
Impacted products
Vendor Product Version
WordPress wordpress-develop Affected: >= 6.4.0 < 6.4.2
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-31211",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-05T14:00:20.723760Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:36:13.480Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T01:46:04.743Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "wordpress-develop",
          "vendor": "WordPress",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 6.4.0 \u003c 6.4.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502: Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-04T23:00:17.782Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653"
        }
      ],
      "source": {
        "advisory": "GHSA-m257-q4m5-j653",
        "discovery": "UNKNOWN"
      },
      "title": "Remote Code Execution in `WP_HTML_Token`"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-31211",
    "datePublished": "2024-04-04T23:00:17.782Z",
    "dateReserved": "2024-03-29T14:16:31.900Z",
    "dateUpdated": "2024-08-02T01:46:04.743Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-31210 (GCVE-0-2024-31210)

Vulnerability from cvelistv5 – Published: 2024-04-04 22:59 – Updated: 2024-08-02 01:46
VLAI?
Title
PHP file upload bypass via Plugin installer
Summary
WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.
CWE
  • CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
References
Impacted products
Vendor Product Version
WordPress wordpress-develop Affected: >= 6.4.0, < 6.4.3
Affected: >= 6.3.0, < 6.3.3
Affected: >= 6.2.0, < 6.2.4
Affected: >= 6.1.0, < 6.1.5
Affected: >= 6.0.0, < 6.0.7
Affected: >= 5.9.0, < 5.9.9
Affected: >= 5.8.0, < 5.8.9
Affected: >= 5.7.0, < 5.7.11
Affected: >= 5.6.0, < 5.6.13
Affected: >= 5.5.0, < 5.5.14
Affected: >= 5.4.0, < 5.4.15
Affected: >= 5.3.0, < 5.3.17
Affected: >= 5.2.0, < 5.2.20
Affected: >= 5.1.0, < 5.1.18
Affected: >= 5.0.0, < 5.0.21
Affected: >= 4.9.0, < 4.9.25
Affected: >= 4.8.0, < 4.8.24
Affected: >= 4.7.0, < 4.7.28
Affected: >= 4.6.0, < 4.6.28
Affected: >= 4.5.0, < 4.5.31
Affected: >= 4.4.0, < 4.4.32
Affected: >= 4.3.0, < 4.3.33
Affected: >= 4.2.0, < 4.2.37
Affected: < 4.1.40
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:wordpress:wordpress-develop:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "wordpress-develop",
            "vendor": "wordpress",
            "versions": [
              {
                "lessThan": "6.4.3",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-31210",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-05T13:59:35.660459Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-31T19:47:42.302Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T01:46:04.580Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "wordpress-develop",
          "vendor": "WordPress",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 6.4.0, \u003c 6.4.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.3.0, \u003c 6.3.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.2.0, \u003c 6.2.4"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.1.0, \u003c 6.1.5"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.0.0, \u003c 6.0.7"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.9.0, \u003c 5.9.9"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.8.0, \u003c 5.8.9"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.7.0, \u003c 5.7.11"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.6.0, \u003c 5.6.13"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.5.0, \u003c 5.5.14"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.4.0, \u003c 5.4.15"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.3.0, \u003c 5.3.17"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.2.0, \u003c 5.2.20"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.1.0, \u003c 5.1.18"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.0.0, \u003c 5.0.21"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.9.0, \u003c 4.9.25"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.8.0, \u003c 4.8.24"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.7.0, \u003c 4.7.28"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.6.0, \u003c 4.6.28"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.5.0, \u003c 4.5.31"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.4.0, \u003c 4.4.32"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.3.0, \u003c 4.3.33"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.2.0, \u003c 4.2.37"
            },
            {
              "status": "affected",
              "version": "\u003c 4.1.40"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress is an open publishing platform for the Web. It\u0027s possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -\u003e Add New -\u003e Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it\u0027s otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-434",
              "description": "CWE-434: Unrestricted Upload of File with Dangerous Type",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-04T22:59:28.955Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r"
        }
      ],
      "source": {
        "advisory": "GHSA-x79f-xrjv-jx5r",
        "discovery": "UNKNOWN"
      },
      "title": "PHP file upload bypass via Plugin installer"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-31210",
    "datePublished": "2024-04-04T22:59:28.955Z",
    "dateReserved": "2024-03-29T14:16:31.900Z",
    "dateUpdated": "2024-08-02T01:46:04.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5561 (GCVE-0-2023-5561)

Vulnerability from cvelistv5 – Published: 2023-10-16 19:39 – Updated: 2025-04-23 16:12
VLAI?
Title
WordPress < 6.3.2 - Unauthenticated Post Author Email Disclosure
Summary
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 6.3.0 , < 6.3.2 (semver)
Affected: 6.2.0 , < 6.2.3 (semver)
Affected: 6.1.0 , < 6.1.4 (semver)
Affected: 6.0.0 , < 6.0.6 (semver)
Affected: 5.9.0 , < 5.9.8 (semver)
Affected: 5.8.0 , < 5.8.8 (semver)
Affected: 5.7.0 , < 5.7.10 (semver)
Affected: 5.6.0 , < 5.6.12 (semver)
Affected: 5.5.0 , < 5.5.13 (semver)
Affected: 5.4.0 , < 5.4.14 (semver)
Affected: 5.3.0 , < 5.3.16 (semver)
Affected: 5.2.0 , < 5.2.19 (semver)
Affected: 5.0.0 , < 5.0.20 (semver)
Affected: 4.9.0 , < 4.9.24 (semver)
Affected: 4.8.0 , < 4.8.23 (semver)
Affected: 4.7.0 , < 4.7.27 (semver)
Create a notification for this product.
Credits
Marc Montpas WPScan
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:59:44.898Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "exploit",
              "vdb-entry",
              "technical-description",
              "x_transferred"
            ],
            "url": "https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441"
          },
          {
            "tags": [
              "technical-description",
              "x_transferred"
            ],
            "url": "https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-5561",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-23T16:07:50.654852Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-23T16:12:25.833Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "lessThan": "6.3.2",
              "status": "affected",
              "version": "6.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.2.3",
              "status": "affected",
              "version": "6.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.1.4",
              "status": "affected",
              "version": "6.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.0.6",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.9.8",
              "status": "affected",
              "version": "5.9.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.8.8",
              "status": "affected",
              "version": "5.8.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.7.10",
              "status": "affected",
              "version": "5.7.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.6.12",
              "status": "affected",
              "version": "5.6.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.5.13",
              "status": "affected",
              "version": "5.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.4.14",
              "status": "affected",
              "version": "5.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.3.16",
              "status": "affected",
              "version": "5.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.2.19",
              "status": "affected",
              "version": "5.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.0.20",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.9.24",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.8.23",
              "status": "affected",
              "version": "4.8.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.7.27",
              "status": "affected",
              "version": "4.7.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Marc Montpas"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "WPScan"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-20T23:06:10.636Z",
        "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
        "shortName": "WPScan"
      },
      "references": [
        {
          "tags": [
            "exploit",
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441"
        },
        {
          "tags": [
            "technical-description"
          ],
          "url": "https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "WordPress \u003c 6.3.2 - Unauthenticated Post Author Email Disclosure",
      "x_generator": {
        "engine": "WPScan CVE Generator"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
    "assignerShortName": "WPScan",
    "cveId": "CVE-2023-5561",
    "datePublished": "2023-10-16T19:39:10.424Z",
    "dateReserved": "2023-10-12T17:42:19.461Z",
    "dateUpdated": "2025-04-23T16:12:25.833Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-39999 (GCVE-0-2023-39999)

Vulnerability from cvelistv5 – Published: 2023-10-13 11:31 – Updated: 2025-02-13 17:03
VLAI?
Title
WordPress < 6.3.2 is vulnerable to Broken Access Control
Summary
Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
Impacted products
Vendor Product Version
WordPress.org WordPress Affected: 6.3 , ≤ 6.3.1 (custom)
Affected: 6.2 , ≤ 6.2.2 (custom)
Affected: 6.1 , ≤ 6.13 (custom)
Affected: 6.0 , ≤ 6.0.5 (custom)
Affected: 5.9 , ≤ 5.9.7 (custom)
Affected: 5.8 , ≤ 5.8.7 (custom)
Affected: 5.7 , ≤ 5.7.9 (custom)
Affected: 5.6 , ≤ 5.6.11 (custom)
Affected: 5.5 , ≤ 5.5.12 (custom)
Affected: 5.4 , ≤ 5.4.13 (custom)
Affected: 5.3 , ≤ 5.3.15 (custom)
Affected: 5.2 , ≤ 5.2.18 (custom)
Affected: 5.1 , ≤ 5.1.16 (custom)
Affected: 5.0 , ≤ 5.0.19 (custom)
Affected: 4.9 , ≤ 4.9.23 (custom)
Affected: 4.8 , ≤ 4.8.22 (custom)
Affected: 4.7 , ≤ 4.7.26 (custom)
Affected: 4.6 , ≤ 4.6.26 (custom)
Affected: 4.5 , ≤ 4.5.29 (custom)
Affected: 4.4 , ≤ 4.4.30 (custom)
Affected: 4.3 , ≤ 4.3.31 (custom)
Affected: 4.2 , ≤ 4.2.35 (custom)
Affected: 4.1 , ≤ 4.1.38 (custom)
Create a notification for this product.
Credits
Rafie Muhammad (Patchstack) Jb Audras (WordPress Security Team)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:18:10.210Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
          },
          {
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress.org",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.3.2",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.1",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.2",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.13",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.6",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.5",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.7",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.8.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.8.7",
              "status": "affected",
              "version": "5.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.7.10",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.7.9",
              "status": "affected",
              "version": "5.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.6.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.6.11",
              "status": "affected",
              "version": "5.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.5.13",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.5.12",
              "status": "affected",
              "version": "5.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.4.14",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.4.13",
              "status": "affected",
              "version": "5.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.3.16",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.3.15",
              "status": "affected",
              "version": "5.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.2.19",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.2.18",
              "status": "affected",
              "version": "5.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.1.17",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.1.16",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.0.20",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.19",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.9.24",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.9.23",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.8.23",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.8.22",
              "status": "affected",
              "version": "4.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.7.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.7.26",
              "status": "affected",
              "version": "4.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.6.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.6.26",
              "status": "affected",
              "version": "4.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.5.30",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.5.29",
              "status": "affected",
              "version": "4.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.4.31",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.4.30",
              "status": "affected",
              "version": "4.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.3.32",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.3.31",
              "status": "affected",
              "version": "4.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.2.36",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.2.35",
              "status": "affected",
              "version": "4.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.1.39",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.1.38",
              "status": "affected",
              "version": "4.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Rafie Muhammad (Patchstack)"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Jb Audras (WordPress Security Team)"
        }
      ],
      "datePublic": "2023-10-13T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Exposure of Sensitive Information to an Unauthorized Actor in WordPress\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.\u003c/span\u003e"
            }
          ],
          "value": "Exposure of Sensitive Information to an Unauthorized Actor in WordPress\u00a0from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-1",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-20T23:06:12.283Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
        },
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update to suitable (6.3.2,\u0026nbsp;6.2.3, 6.1.4, 6.0.6, 5.9.8, 5.8.8, 5.7.10, 5.6.12, 5.5.13, 5.4.14, 5.3.16, 5.2.19, 5.1.17, 5.0.20, 4.9.24, 4.8.23, 4.7.27, 4.6.27, 4.5.30, 4.4.31, 4.3.32, 4.2.36, 4.1.39) or a higher version."
            }
          ],
          "value": "Update to suitable (6.3.2,\u00a06.2.3, 6.1.4, 6.0.6, 5.9.8, 5.8.8, 5.7.10, 5.6.12, 5.5.13, 5.4.14, 5.3.16, 5.2.19, 5.1.17, 5.0.20, 4.9.24, 4.8.23, 4.7.27, 4.6.27, 4.5.30, 4.4.31, 4.3.32, 4.2.36, 4.1.39) or a higher version."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "WordPress \u003c 6.3.2 is vulnerable to Broken Access Control",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2023-39999",
    "datePublished": "2023-10-13T11:31:16.977Z",
    "dateReserved": "2023-08-08T11:43:05.859Z",
    "dateUpdated": "2025-02-13T17:03:20.665Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-38000 (GCVE-0-2023-38000)

Vulnerability from cvelistv5 – Published: 2023-10-13 09:55 – Updated: 2024-08-02 17:23
VLAI?
Title
Auth. Stored Cross-Site Scripting (XSS) vulnerability in WordPress core and Gutenberg plugin via Navigation Links Block
Summary
Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
WordPress.org WordPress Affected: 6.3 , ≤ 6.3.1 (custom)
Affected: 6.2 , ≤ 6.2.2 (custom)
Affected: 6.1 , ≤ 6.1.3 (custom)
Affected: 6.0 , ≤ 6.0.5 (custom)
Affected: 5.9 , ≤ 5.9.7 (custom)
Create a notification for this product.
    Gutenberg Team Gutenberg Affected: n/a , ≤ 16.8.0 (custom)
Create a notification for this product.
Credits
Rafie Muhammad (Patchstack) Edouard Lamoine (Patchstack)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T17:23:27.829Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
          },
          {
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-core-6-3-2-contributor-stored-xss-in-navigation-links-block-vulnerability?_s_id=cve"
          },
          {
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "https://patchstack.com/database/vulnerability/gutenberg/wordpress-gutenberg-plugin-16-8-0-contributor-stored-xss-in-navigation-links-block-vulnerability?_s_id=cve"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress.org",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.3.2",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.1",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.2",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.1.3",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.6",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.5",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.7",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            }
          ]
        },
        {
          "collectionURL": "https://wordpress.org/plugins",
          "defaultStatus": "unaffected",
          "packageName": "gutenberg",
          "product": "Gutenberg",
          "vendor": "Gutenberg Team",
          "versions": [
            {
              "changes": [
                {
                  "at": "16.8.1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "16.8.0",
              "status": "affected",
              "version": "n/a",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Rafie Muhammad (Patchstack)"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Edouard Lamoine (Patchstack)"
        }
      ],
      "datePublic": "2023-10-13T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003e6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin \u0026lt;= 16.8.0 versions.\u003c/span\u003e"
            }
          ],
          "value": "Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core\u00a06.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin \u003c= 16.8.0 versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-13T10:34:00.870Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
        },
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-core-6-3-2-contributor-stored-xss-in-navigation-links-block-vulnerability?_s_id=cve"
        },
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/vulnerability/gutenberg/wordpress-gutenberg-plugin-16-8-0-contributor-stored-xss-in-navigation-links-block-vulnerability?_s_id=cve"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update WordPress core to the 6.3.2,\u0026nbsp;6.2.3,\u0026nbsp;6.1.4,\u0026nbsp;6.0.6,\u0026nbsp;5.9.8 or a higher version."
            }
          ],
          "value": "Update WordPress core to the 6.3.2,\u00a06.2.3,\u00a06.1.4,\u00a06.0.6,\u00a05.9.8 or a higher version."
        },
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update\u0026nbsp;Gutenberg to\u0026nbsp;16.8.1 or a higher version."
            }
          ],
          "value": "Update\u00a0Gutenberg to\u00a016.8.1 or a higher version."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Auth. Stored Cross-Site Scripting (XSS) vulnerability in WordPress core and Gutenberg plugin via Navigation Links Block",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2023-38000",
    "datePublished": "2023-10-13T09:55:54.690Z",
    "dateReserved": "2023-07-11T12:50:13.630Z",
    "dateUpdated": "2024-08-02T17:23:27.829Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-2745 (GCVE-0-2023-2745)

Vulnerability from cvelistv5 – Published: 2023-05-17 08:36 – Updated: 2025-04-24 18:22
VLAI?
Summary
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
Assigner
Impacted products
Vendor Product Version
WordPress Foundation WordPress Affected: * , ≤ 4.1 (semver)
Affected: 4.1 , < 4.1.38 (semver)
Affected: 4.2 , < 4.2.35 (semver)
Affected: 4.3 , < 4.3.31 (semver)
Affected: 4.4 , < 4.4.30 (semver)
Affected: 4.5 , < 4.5.29 (semver)
Affected: 4.6 , < 4.6.26 (semver)
Affected: 4.7 , < 4.7.26 (semver)
Affected: 4.8 , < 4.8.22 (semver)
Affected: 4.9 , < 4.9.23 (semver)
Affected: 5.0 , < 5.0.19 (semver)
Affected: 5.1 , < 5.1.16 (semver)
Affected: 5.2 , < 5.2.18 (semver)
Affected: 5.3 , < 5.3.15 (semver)
Affected: 5.4 , < 5.4.13 (semver)
Affected: 5.5 , < 5.5.12 (semver)
Affected: 5.6 , < 5.6.11 (semver)
Affected: 5.7 , < 5.7.9 (semver)
Affected: 5.8 , < 5.8.7 (semver)
Affected: 5.9 , < 5.9.6 (semver)
Affected: 6.0 , < 6.0.4 (semver)
Affected: 6.1 , < 6.1.2 (semver)
Affected: 6.2 , < 6.2.1 (semver)
Create a notification for this product.
Credits
Ramuel Gall Matt Rusnak
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-04-24T18:22:33.536Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://www.exploit-db.com/exploits/52274"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=55765%40%2F\u0026new=55765%40%2F\u0026sfp_email=\u0026sfph_mail="
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html"
          }
        ],
        "title": "CVE Program Container",
        "x_generator": {
          "engine": "ADPogram 0.0.1"
        }
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-2745",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-13T16:22:24.483760Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-13T16:49:16.213Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress Foundation",
          "versions": [
            {
              "lessThanOrEqual": "4.1",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            },
            {
              "lessThan": "4.1.38",
              "status": "affected",
              "version": "4.1",
              "versionType": "semver"
            },
            {
              "lessThan": "4.2.35",
              "status": "affected",
              "version": "4.2",
              "versionType": "semver"
            },
            {
              "lessThan": "4.3.31",
              "status": "affected",
              "version": "4.3",
              "versionType": "semver"
            },
            {
              "lessThan": "4.4.30",
              "status": "affected",
              "version": "4.4",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.29",
              "status": "affected",
              "version": "4.5",
              "versionType": "semver"
            },
            {
              "lessThan": "4.6.26",
              "status": "affected",
              "version": "4.6",
              "versionType": "semver"
            },
            {
              "lessThan": "4.7.26",
              "status": "affected",
              "version": "4.7",
              "versionType": "semver"
            },
            {
              "lessThan": "4.8.22",
              "status": "affected",
              "version": "4.8",
              "versionType": "semver"
            },
            {
              "lessThan": "4.9.23",
              "status": "affected",
              "version": "4.9",
              "versionType": "semver"
            },
            {
              "lessThan": "5.0.19",
              "status": "affected",
              "version": "5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.1.16",
              "status": "affected",
              "version": "5.1",
              "versionType": "semver"
            },
            {
              "lessThan": "5.2.18",
              "status": "affected",
              "version": "5.2",
              "versionType": "semver"
            },
            {
              "lessThan": "5.3.15",
              "status": "affected",
              "version": "5.3",
              "versionType": "semver"
            },
            {
              "lessThan": "5.4.13",
              "status": "affected",
              "version": "5.4",
              "versionType": "semver"
            },
            {
              "lessThan": "5.5.12",
              "status": "affected",
              "version": "5.5",
              "versionType": "semver"
            },
            {
              "lessThan": "5.6.11",
              "status": "affected",
              "version": "5.6",
              "versionType": "semver"
            },
            {
              "lessThan": "5.7.9",
              "status": "affected",
              "version": "5.7",
              "versionType": "semver"
            },
            {
              "lessThan": "5.8.7",
              "status": "affected",
              "version": "5.8",
              "versionType": "semver"
            },
            {
              "lessThan": "5.9.6",
              "status": "affected",
              "version": "5.9",
              "versionType": "semver"
            },
            {
              "lessThan": "6.0.4",
              "status": "affected",
              "version": "6.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.1.2",
              "status": "affected",
              "version": "6.1",
              "versionType": "semver"
            },
            {
              "lessThan": "6.2.1",
              "status": "affected",
              "version": "6.2",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Ramuel Gall"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Matt Rusnak"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the \u2018wp_lang\u2019 parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-21T00:06:14.619Z",
        "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
        "shortName": "Wordfence"
      },
      "references": [
        {
          "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve"
        },
        {
          "url": "https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=55765%40%2F\u0026new=55765%40%2F\u0026sfp_email=\u0026sfph_mail="
        },
        {
          "url": "http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2023-05-16T00:00:00.000+00:00",
          "value": "Disclosed"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
    "assignerShortName": "Wordfence",
    "cveId": "CVE-2023-2745",
    "datePublished": "2023-05-17T08:36:44.034Z",
    "dateReserved": "2023-05-16T19:53:02.398Z",
    "dateUpdated": "2025-04-24T18:22:33.536Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CERTFR-2024-AVI-0516

Vulnerability from certfr_avis - Published: 2024-06-25 - Updated: 2024-06-25

De multiples vulnérabilités ont été découvertes dans WordPress. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS) et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
WordPress WordPress WordPress versions antérieures à 6.5.5
References
Bulletin de sécurité WordPress 2024-06-24 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WordPress versions ant\u00e9rieures \u00e0 6.5.5",
      "product": {
        "name": "WordPress",
        "vendor": {
          "name": "WordPress",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [],
  "initial_release_date": "2024-06-25T00:00:00",
  "last_revision_date": "2024-06-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0516",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-06-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans WordPress. Elles permettent \u00e0 un attaquant de provoquer une injection de code indirecte \u00e0 distance (XSS) et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans WordPress",
  "vendor_advisories": [
    {
      "published_at": "2024-06-24",
      "title": "Bulletin de s\u00e9curit\u00e9 WordPress",
      "url": "https://wordpress.org/news/2024/06/wordpress-6-5-5/"
    }
  ]
}

CERTFR-2024-AVI-0285

Vulnerability from certfr_avis - Published: 2024-04-10 - Updated: 2024-04-10

Une vulnérabilité a été découverte dans WordPress. Elle permet à un attaquant de provoquer une injection de code indirecte à distance (XSS).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
WordPress WordPress WordPress versions antérieures à 6.5.2
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WordPress versions ant\u00e9rieures \u00e0 6.5.2",
      "product": {
        "name": "WordPress",
        "vendor": {
          "name": "WordPress",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2024-04-10T00:00:00",
  "last_revision_date": "2024-04-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0285",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-04-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWordPress\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nune injection de code indirecte \u00e0 distance (XSS).\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans WordPress",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 WordPress du 09 avril 2024",
      "url": "https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/"
    }
  ]
}

CERTFR-2023-AVI-1003

Vulnerability from certfr_avis - Published: 2023-12-07 - Updated: 2023-12-07

Une vulnérabilité a été découverte dans WordPress. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
WordPress WordPress WordPress versions antérieures à 6.4.2
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WordPress versions ant\u00e9rieures \u00e0 6.4.2",
      "product": {
        "name": "WordPress",
        "vendor": {
          "name": "WordPress",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2023-12-07T00:00:00",
  "last_revision_date": "2023-12-07T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-1003",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-12-07T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans WordPress. Elle permet \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans WordPress",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 WordPress wordpress-6-4-2 du 06 d\u00e9cembre 2023",
      "url": "https://wordpress.org/news/2023/12/wordpress-6-4-2-maintenance-security-release/"
    }
  ]
}

CERTFR-2023-AVI-0842

Vulnerability from certfr_avis - Published: 2023-10-13 - Updated: 2023-10-13

De multiples vulnérabilités ont été découvertes dans WordPress. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
WordPress WordPress WordPress versions antérieures à 6.3.2

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WordPress versions ant\u00e9rieures \u00e0 6.3.2",
      "product": {
        "name": "WordPress",
        "vendor": {
          "name": "WordPress",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2023-10-13T00:00:00",
  "last_revision_date": "2023-10-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0842",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-10-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eWordPress\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\nd\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans WordPress",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 WordPress wordpress-6-3-2-maintenance-and-security-release du 12 octobre 2023",
      "url": "https://wordpress.org/news/2023/10/wordpress-6-3-2-maintenance-and-security-release/"
    }
  ]
}

CERTFR-2023-AVI-0402

Vulnerability from certfr_avis - Published: 2023-05-22 - Updated: 2023-05-22

Une vulnérabilité a été découverte dans Wordpress. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
WordPress WordPress WordPress versions antérieures à 6.2.2
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WordPress versions ant\u00e9rieures \u00e0 6.2.2",
      "product": {
        "name": "WordPress",
        "vendor": {
          "name": "WordPress",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2023-05-22T00:00:00",
  "last_revision_date": "2023-05-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0402",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-05-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wordpress. Elle permet \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wordpress",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wordpress wordpress-6-2-2-security-release du 20 mai 2023",
      "url": "https://wordpress.org/news/2023/05/wordpress-6-2-2-security-release/"
    }
  ]
}

CERTFR-2023-AVI-0386

Vulnerability from certfr_avis - Published: 2023-05-17 - Updated: 2023-05-17

De multiples vulnérabilités ont été découvertes dans WordPress. Certaines d'entre elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
WordPress WordPress WordPress versions antérieures à 6.2.1
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WordPress versions ant\u00e9rieures \u00e0 6.2.1",
      "product": {
        "name": "WordPress",
        "vendor": {
          "name": "WordPress",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2023-05-17T00:00:00",
  "last_revision_date": "2023-05-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0386",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-05-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans WordPress.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\ncontournement de la politique de s\u00e9curit\u00e9, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0\ndistance (XSS).\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans WordPress",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 WordPress wordpress-6-2-1-maintenance-security-release du 16 mai 2023",
      "url": "https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/"
    }
  ]
}