VID |
22933 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
WordPress versions 5.3.0 and earlier are affected by the following vulnerabilities:
- Two cross-site scripting (XSS) vulnerabilities exist due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit these, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.
- A remote, authenticated, unprivileged user can make a post sticky via the REST API.
- wp_kses_bad_protcol() has been hardened to ensure that it is aware of the named colon attribute.
* References: https://wordpress.org/support/wordpress-version/version-5-3-1/
* Platforms Affected: WordPress prior to 5.3.1 Any operating system Any version |
Recommendation |
Upgrade to the version (5.3.1 or later) fixed this vulnerability, available from the WordPress Download Web page at http://wordpress.org/download/ |
Related URL |
CVE-2019-20042 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|