Search criteria

1129 vulnerabilities found for wordpress by wordpress

CVE-2025-58674 (GCVE-0-2025-58674)

Vulnerability from cvelistv5 – Published: 2025-09-23 18:47 – Updated: 2025-10-01 08:35 X_Open Source
VLAI?
Title
WordPress <= 6.8.2 - (Author+) Cross Site Scripting (XSS) Vulnerability
Summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 6.8 , ≤ 6.8.2 (custom)
Affected: 6.7 , ≤ 6.7.3 (custom)
Affected: 6.6 , ≤ 6.6.3 (custom)
Affected: 6.5 , ≤ 6.5.6 (custom)
Affected: 6.4 , ≤ 6.4.6 (custom)
Affected: 6.3 , ≤ 6.3.6 (custom)
Affected: 6.2 , ≤ 6.2.7 (custom)
Affected: 6.1 , ≤ 6.1.8 (custom)
Affected: 6.0 , ≤ 6.0.10 (custom)
Affected: 5.9 , ≤ 5.9.11 (custom)
Affected: 5.8 , ≤ 5.8.11 (custom)
Affected: 5.7 , ≤ 5.7.13 (custom)
Affected: 5.6 , ≤ 5.6.15 (custom)
Affected: 5.5 , ≤ 5.5.16 (custom)
Affected: 5.4 , ≤ 5.4.17 (custom)
Affected: 5.3 , ≤ 5.3.19 (custom)
Affected: 5.2 , ≤ 5.2.22 (custom)
Affected: 5.1 , ≤ 5.1.20 (custom)
Affected: 5.0 , ≤ 5.0.23 (custom)
Affected: 4.9 , ≤ 4.9.27 (custom)
Affected: 4.8 , ≤ 4.8.26 (custom)
Affected: 4.7 , ≤ 4.7.30 (custom)
Create a notification for this product.
Credits
savphill (Patchstack Bug Bounty Program) John Blackbourn (WordPress core security team lead)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-58674",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-23T19:15:09.886956Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-23T19:17:35.099Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "repo": "https://github.com/WordPress/WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.8.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.8.2",
              "status": "affected",
              "version": "6.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.7.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.7.3",
              "status": "affected",
              "version": "6.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.6.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.6.3",
              "status": "affected",
              "version": "6.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.5.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.5.6",
              "status": "affected",
              "version": "6.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.4.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.6",
              "status": "affected",
              "version": "6.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.3.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.6",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.7",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.9",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.1.8",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.11",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.10",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.11",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.8.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.8.11",
              "status": "affected",
              "version": "5.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.7.14",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.7.13",
              "status": "affected",
              "version": "5.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.6.16",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.6.15",
              "status": "affected",
              "version": "5.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.5.17",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.5.16",
              "status": "affected",
              "version": "5.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.4.18",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.4.17",
              "status": "affected",
              "version": "5.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.3.20",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.3.19",
              "status": "affected",
              "version": "5.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.2.23",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.2.22",
              "status": "affected",
              "version": "5.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.1.21",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.1.20",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.0.24",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.23",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.9.28",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.9.27",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.8.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.8.26",
              "status": "affected",
              "version": "4.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.7.31",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.7.30",
              "status": "affected",
              "version": "4.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "savphill (Patchstack Bug Bounty Program)"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "John Blackbourn (WordPress core security team lead)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003eImproper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.\u003c/span\u003e\u003cp\u003eThis issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.\u003c/p\u003e"
            }
          ],
          "value": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-01T08:35:39.048Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/wordpress/wordpress/wordpress/vulnerability/wordpress-wordpress-wordpress-6-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://wordpress.org/news/2025/09/wordpress-6-8-3-release/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
            }
          ],
          "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "tags": [
        "x_open-source"
      ],
      "title": "WordPress \u003c= 6.8.2 - (Author+) Cross Site Scripting (XSS) Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2025-58674",
    "datePublished": "2025-09-23T18:47:02.628Z",
    "dateReserved": "2025-09-03T09:03:46.831Z",
    "dateUpdated": "2025-10-01T08:35:39.048Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-58246 (GCVE-0-2025-58246)

Vulnerability from cvelistv5 – Published: 2025-09-23 17:17 – Updated: 2025-10-01 08:37 X_Open Source
VLAI?
Title
WordPress <= 6.8.2 - (Contributor+) Sensitive Data Exposure Vulnerability
Summary
Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it. This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
CWE
  • CWE-201 - Insertion of Sensitive Information Into Sent Data
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 6.8 , ≤ 6.8.2 (custom)
Affected: 6.7 , ≤ 6.7.3 (custom)
Affected: 6.6 , ≤ 6.6.3 (custom)
Affected: 6.5 , ≤ 6.5.6 (custom)
Affected: 6.4 , ≤ 6.4.6 (custom)
Affected: 6.3 , ≤ 6.3.6 (custom)
Affected: 6.2 , ≤ 6.2.7 (custom)
Affected: 6.1 , ≤ 6.1.8 (custom)
Affected: 6.0 , ≤ 6.0.10 (custom)
Affected: 5.9 , ≤ 5.9.11 (custom)
Affected: 5.8 , ≤ 5.8.11 (custom)
Affected: 5.7 , ≤ 5.7.13 (custom)
Affected: 5.6 , ≤ 5.6.15 (custom)
Affected: 5.5 , ≤ 5.5.16 (custom)
Affected: 5.4 , ≤ 5.4.17 (custom)
Affected: 5.3 , ≤ 5.3.19 (custom)
Affected: 5.2 , ≤ 5.2.22 (custom)
Affected: 5.1 , ≤ 5.1.20 (custom)
Affected: 5.0 , ≤ 5.0.23 (custom)
Affected: 4.9 , ≤ 4.9.27 (custom)
Affected: 4.8 , ≤ 4.8.26 (custom)
Affected: 4.7 , ≤ 4.7.30 (custom)
Create a notification for this product.
Credits
Abu Hurayra (Patchstack Bug Bounty Program) John Blackbourn (WordPress core security team lead) Timothy Jacobs Peter Wilson Mike Nelson
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-58246",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-23T18:30:39.501670Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-23T18:37:38.153Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "repo": "https://github.com/WordPress/WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.8.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.8.2",
              "status": "affected",
              "version": "6.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.7.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.7.3",
              "status": "affected",
              "version": "6.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.6.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.6.3",
              "status": "affected",
              "version": "6.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.5.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.5.6",
              "status": "affected",
              "version": "6.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.4.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.6",
              "status": "affected",
              "version": "6.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.3.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.6",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.7",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.9",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.1.8",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.11",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.10",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.11",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.8.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.8.11",
              "status": "affected",
              "version": "5.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.7.14",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.7.13",
              "status": "affected",
              "version": "5.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.6.16",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.6.15",
              "status": "affected",
              "version": "5.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.5.17",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.5.16",
              "status": "affected",
              "version": "5.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.4.18",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.4.17",
              "status": "affected",
              "version": "5.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.3.20",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.3.19",
              "status": "affected",
              "version": "5.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.2.23",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.2.22",
              "status": "affected",
              "version": "5.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.1.21",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.1.20",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.0.24",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.23",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.9.28",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.9.27",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.8.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.8.26",
              "status": "affected",
              "version": "4.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.7.31",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.7.30",
              "status": "affected",
              "version": "4.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Abu Hurayra (Patchstack Bug Bounty Program)"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "John Blackbourn (WordPress core security team lead)"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Timothy Jacobs"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Peter Wilson"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Mike Nelson"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eInsertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it.\u003c/span\u003e\u003cbr\u003e\u003cp\u003eThis issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.\u003c/p\u003e"
            }
          ],
          "value": "Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it.\nThis issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-37",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-37 Retrieve Embedded Sensitive Data"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-201",
              "description": "CWE-201 Insertion of Sensitive Information Into Sent Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-01T08:37:01.207Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/wordpress/wordpress/wordpress/vulnerability/wordpress-wordpress-wordpress-6-8-2-sensitive-data-exposure-vulnerability?_s_id=cve"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://wordpress.org/news/2025/09/wordpress-6-8-3-release/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
            }
          ],
          "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "tags": [
        "x_open-source"
      ],
      "title": "WordPress \u003c= 6.8.2 - (Contributor+) Sensitive Data Exposure Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2025-58246",
    "datePublished": "2025-09-23T17:17:12.399Z",
    "dateReserved": "2025-08-27T16:19:44.959Z",
    "dateUpdated": "2025-10-01T08:37:01.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-54352 (GCVE-0-2025-54352)

Vulnerability from cvelistv5 – Published: 2025-07-21 00:00 – Updated: 2025-07-21 18:15
VLAI?
Summary
WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior.
CWE
  • CWE-669 - Incorrect Resource Transfer Between Spheres
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 3.5 , ≤ 6.8.2 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54352",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-21T18:14:44.588087Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-21T18:15:20.785Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "lessThanOrEqual": "6.8.2",
              "status": "affected",
              "version": "3.5",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
                  "versionEndIncluding": "6.8.2",
                  "versionStartIncluding": "3.5",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-669",
              "description": "CWE-669 Incorrect Resource Transfer Between Spheres",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-21T04:27:10.814Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.imperva.com/blog/beware-a-threat-actor-could-steal-the-titles-of-your-private-and-draft-wordpress-posts/"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2025-54352",
    "datePublished": "2025-07-21T00:00:00.000Z",
    "dateReserved": "2025-07-21T00:00:00.000Z",
    "dateUpdated": "2025-07-21T18:15:20.785Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-4973 (GCVE-0-2022-4973)

Vulnerability from cvelistv5 – Published: 2024-10-16 06:43 – Updated: 2024-10-16 12:59
VLAI?
Title
WordPress Core < 6.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via use of the_meta(); function
Summary
WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
WordPress Foundation WordPress Affected: * , ≤ 3.6.1 (semver)
Affected: 3.7 , ≤ 3.7.38 (semver)
Affected: 3.8 , ≤ 3.8.38 (semver)
Affected: 3.9 , ≤ 3.9.36 (semver)
Affected: 4.0 , ≤ 4.0.35 (semver)
Affected: 4.1 , ≤ 4.1.35 (semver)
Affected: 4.2 , ≤ 4.2.32 (semver)
Affected: 4.3 , ≤ 4.3.28 (semver)
Affected: 4.4 , ≤ 4.4.27 (semver)
Affected: 4.5 , ≤ 4.5.26 (semver)
Affected: 4.6 , ≤ 4.6.23 (semver)
Affected: 4.7 , ≤ 4.7.23 (semver)
Affected: 4.8 , ≤ 4.8.19 (semver)
Affected: 4.9 , ≤ 4.9.20 (semver)
Affected: 5.0 , ≤ 5.0.16 (semver)
Affected: 5.1 , ≤ 5.1.13 (semver)
Affected: 5.2 , ≤ 5.2.15 (semver)
Affected: 5.3 , ≤ 5.3.12 (semver)
Affected: 5.4 , ≤ 5.4.10 (semver)
Affected: 5.5 , ≤ 5.5.9 (semver)
Affected: 5.6 , ≤ 5.6.8 (semver)
Affected: 5.7 , ≤ 5.7.6 (semver)
Affected: 5.8 , ≤ 5.8.4 (semver)
Affected: 5.9 , ≤ 5.9.3 (semver)
Affected: 6.0 , ≤ 6.0.1 (semver)
Create a notification for this product.
Credits
John Blackbourn
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-4973",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-16T12:59:16.874933Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-16T12:59:35.321Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress Foundation",
          "versions": [
            {
              "lessThanOrEqual": "3.6.1",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "3.7.38",
              "status": "affected",
              "version": "3.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "3.8.38",
              "status": "affected",
              "version": "3.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "3.9.36",
              "status": "affected",
              "version": "3.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.0.35",
              "status": "affected",
              "version": "4.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.1.35",
              "status": "affected",
              "version": "4.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.2.32",
              "status": "affected",
              "version": "4.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.3.28",
              "status": "affected",
              "version": "4.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.4.27",
              "status": "affected",
              "version": "4.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.5.26",
              "status": "affected",
              "version": "4.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.6.23",
              "status": "affected",
              "version": "4.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.7.23",
              "status": "affected",
              "version": "4.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.8.19",
              "status": "affected",
              "version": "4.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.20",
              "status": "affected",
              "version": "4.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.0.16",
              "status": "affected",
              "version": "5.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.1.13",
              "status": "affected",
              "version": "5.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.2.15",
              "status": "affected",
              "version": "5.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.3.12",
              "status": "affected",
              "version": "5.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.10",
              "status": "affected",
              "version": "5.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.5.9",
              "status": "affected",
              "version": "5.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.6.8",
              "status": "affected",
              "version": "5.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.7.6",
              "status": "affected",
              "version": "5.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.8.4",
              "status": "affected",
              "version": "5.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.9.3",
              "status": "affected",
              "version": "5.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.0.1",
              "status": "affected",
              "version": "6.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "John Blackbourn"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-16T06:43:41.734Z",
        "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
        "shortName": "Wordfence"
      },
      "references": [
        {
          "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset/53961"
        },
        {
          "url": "https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/"
        },
        {
          "url": "https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2022-08-30T00:00:00.000+00:00",
          "value": "Disclosed"
        }
      ],
      "title": "WordPress Core \u003c 6.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via use of the_meta(); function"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
    "assignerShortName": "Wordfence",
    "cveId": "CVE-2022-4973",
    "datePublished": "2024-10-16T06:43:41.734Z",
    "dateReserved": "2024-10-15T18:03:44.130Z",
    "dateUpdated": "2024-10-16T12:59:35.321Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-4439 (GCVE-0-2024-4439)

Vulnerability from cvelistv5 – Published: 2024-05-03 05:32 – Updated: 2024-08-01 20:40
VLAI?
Summary
WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.
Assigner
Impacted products
Vendor Product Version
WordPress Foundation WordPress Affected: 6.0 , ≤ 6.0.7 (semver)
Affected: 6.1 , ≤ 6.1.5 (semver)
Affected: 6.2 , ≤ 6.2.4 (semver)
Affected: 6.3 , ≤ 6.3.3 (semver)
Affected: 6.4 , ≤ 6.4.3 (semver)
Affected: 6.5 , ≤ 6.5.1 (semver)
Create a notification for this product.
Credits
John Blackbourn Matthew Rollings
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:wordpress:wordpress:6.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "wordpress",
            "vendor": "wordpress",
            "versions": [
              {
                "lessThanOrEqual": "6.5.1",
                "status": "affected",
                "version": "6.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-4439",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-09T19:37:57.427844Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-80",
                "description": "CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:54:08.655Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:40:47.361Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cve"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=57950%40%2F\u0026new=57950%40%2F\u0026sfp_email=\u0026sfph_mail=#file3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress Foundation",
          "versions": [
            {
              "lessThanOrEqual": "6.0.7",
              "status": "affected",
              "version": "6.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.5",
              "status": "affected",
              "version": "6.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.2.4",
              "status": "affected",
              "version": "6.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.3.3",
              "status": "affected",
              "version": "6.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.4.3",
              "status": "affected",
              "version": "6.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.1",
              "status": "affected",
              "version": "6.5",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "John Blackbourn"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Matthew Rollings"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author\u0027s avatar."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-03T05:32:34.988Z",
        "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
        "shortName": "Wordfence"
      },
      "references": [
        {
          "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cve"
        },
        {
          "url": "https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=57950%40%2F\u0026new=57950%40%2F\u0026sfp_email=\u0026sfph_mail=#file3"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php"
        },
        {
          "url": "https://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-04-09T00:00:00.000+00:00",
          "value": "Disclosed"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
    "assignerShortName": "Wordfence",
    "cveId": "CVE-2024-4439",
    "datePublished": "2024-05-03T05:32:34.988Z",
    "dateReserved": "2024-05-02T16:33:12.426Z",
    "dateUpdated": "2024-08-01T20:40:47.361Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-31211 (GCVE-0-2024-31211)

Vulnerability from cvelistv5 – Published: 2024-04-04 23:00 – Updated: 2024-08-02 01:46
VLAI?
Title
Remote Code Execution in `WP_HTML_Token`
Summary
WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.
CWE
  • CWE-502 - Deserialization of Untrusted Data
Assigner
References
Impacted products
Vendor Product Version
WordPress wordpress-develop Affected: >= 6.4.0 < 6.4.2
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-31211",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-05T14:00:20.723760Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:36:13.480Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T01:46:04.743Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "wordpress-develop",
          "vendor": "WordPress",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 6.4.0 \u003c 6.4.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502: Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-04T23:00:17.782Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653"
        }
      ],
      "source": {
        "advisory": "GHSA-m257-q4m5-j653",
        "discovery": "UNKNOWN"
      },
      "title": "Remote Code Execution in `WP_HTML_Token`"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-31211",
    "datePublished": "2024-04-04T23:00:17.782Z",
    "dateReserved": "2024-03-29T14:16:31.900Z",
    "dateUpdated": "2024-08-02T01:46:04.743Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-31210 (GCVE-0-2024-31210)

Vulnerability from cvelistv5 – Published: 2024-04-04 22:59 – Updated: 2024-08-02 01:46
VLAI?
Title
PHP file upload bypass via Plugin installer
Summary
WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.
CWE
  • CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
References
Impacted products
Vendor Product Version
WordPress wordpress-develop Affected: >= 6.4.0, < 6.4.3
Affected: >= 6.3.0, < 6.3.3
Affected: >= 6.2.0, < 6.2.4
Affected: >= 6.1.0, < 6.1.5
Affected: >= 6.0.0, < 6.0.7
Affected: >= 5.9.0, < 5.9.9
Affected: >= 5.8.0, < 5.8.9
Affected: >= 5.7.0, < 5.7.11
Affected: >= 5.6.0, < 5.6.13
Affected: >= 5.5.0, < 5.5.14
Affected: >= 5.4.0, < 5.4.15
Affected: >= 5.3.0, < 5.3.17
Affected: >= 5.2.0, < 5.2.20
Affected: >= 5.1.0, < 5.1.18
Affected: >= 5.0.0, < 5.0.21
Affected: >= 4.9.0, < 4.9.25
Affected: >= 4.8.0, < 4.8.24
Affected: >= 4.7.0, < 4.7.28
Affected: >= 4.6.0, < 4.6.28
Affected: >= 4.5.0, < 4.5.31
Affected: >= 4.4.0, < 4.4.32
Affected: >= 4.3.0, < 4.3.33
Affected: >= 4.2.0, < 4.2.37
Affected: < 4.1.40
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:wordpress:wordpress-develop:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "wordpress-develop",
            "vendor": "wordpress",
            "versions": [
              {
                "lessThan": "6.4.3",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-31210",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-05T13:59:35.660459Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-31T19:47:42.302Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T01:46:04.580Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "wordpress-develop",
          "vendor": "WordPress",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 6.4.0, \u003c 6.4.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.3.0, \u003c 6.3.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.2.0, \u003c 6.2.4"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.1.0, \u003c 6.1.5"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.0.0, \u003c 6.0.7"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.9.0, \u003c 5.9.9"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.8.0, \u003c 5.8.9"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.7.0, \u003c 5.7.11"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.6.0, \u003c 5.6.13"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.5.0, \u003c 5.5.14"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.4.0, \u003c 5.4.15"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.3.0, \u003c 5.3.17"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.2.0, \u003c 5.2.20"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.1.0, \u003c 5.1.18"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.0.0, \u003c 5.0.21"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.9.0, \u003c 4.9.25"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.8.0, \u003c 4.8.24"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.7.0, \u003c 4.7.28"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.6.0, \u003c 4.6.28"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.5.0, \u003c 4.5.31"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.4.0, \u003c 4.4.32"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.3.0, \u003c 4.3.33"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.2.0, \u003c 4.2.37"
            },
            {
              "status": "affected",
              "version": "\u003c 4.1.40"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress is an open publishing platform for the Web. It\u0027s possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -\u003e Add New -\u003e Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it\u0027s otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-434",
              "description": "CWE-434: Unrestricted Upload of File with Dangerous Type",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-04T22:59:28.955Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r"
        }
      ],
      "source": {
        "advisory": "GHSA-x79f-xrjv-jx5r",
        "discovery": "UNKNOWN"
      },
      "title": "PHP file upload bypass via Plugin installer"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-31210",
    "datePublished": "2024-04-04T22:59:28.955Z",
    "dateReserved": "2024-03-29T14:16:31.900Z",
    "dateUpdated": "2024-08-02T01:46:04.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5561 (GCVE-0-2023-5561)

Vulnerability from cvelistv5 – Published: 2023-10-16 19:39 – Updated: 2025-04-23 16:12
VLAI?
Title
WordPress < 6.3.2 - Unauthenticated Post Author Email Disclosure
Summary
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 6.3.0 , < 6.3.2 (semver)
Affected: 6.2.0 , < 6.2.3 (semver)
Affected: 6.1.0 , < 6.1.4 (semver)
Affected: 6.0.0 , < 6.0.6 (semver)
Affected: 5.9.0 , < 5.9.8 (semver)
Affected: 5.8.0 , < 5.8.8 (semver)
Affected: 5.7.0 , < 5.7.10 (semver)
Affected: 5.6.0 , < 5.6.12 (semver)
Affected: 5.5.0 , < 5.5.13 (semver)
Affected: 5.4.0 , < 5.4.14 (semver)
Affected: 5.3.0 , < 5.3.16 (semver)
Affected: 5.2.0 , < 5.2.19 (semver)
Affected: 5.0.0 , < 5.0.20 (semver)
Affected: 4.9.0 , < 4.9.24 (semver)
Affected: 4.8.0 , < 4.8.23 (semver)
Affected: 4.7.0 , < 4.7.27 (semver)
Create a notification for this product.
Credits
Marc Montpas WPScan
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:59:44.898Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "exploit",
              "vdb-entry",
              "technical-description",
              "x_transferred"
            ],
            "url": "https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441"
          },
          {
            "tags": [
              "technical-description",
              "x_transferred"
            ],
            "url": "https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-5561",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-23T16:07:50.654852Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-23T16:12:25.833Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "lessThan": "6.3.2",
              "status": "affected",
              "version": "6.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.2.3",
              "status": "affected",
              "version": "6.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.1.4",
              "status": "affected",
              "version": "6.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.0.6",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.9.8",
              "status": "affected",
              "version": "5.9.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.8.8",
              "status": "affected",
              "version": "5.8.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.7.10",
              "status": "affected",
              "version": "5.7.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.6.12",
              "status": "affected",
              "version": "5.6.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.5.13",
              "status": "affected",
              "version": "5.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.4.14",
              "status": "affected",
              "version": "5.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.3.16",
              "status": "affected",
              "version": "5.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.2.19",
              "status": "affected",
              "version": "5.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.0.20",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.9.24",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.8.23",
              "status": "affected",
              "version": "4.8.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.7.27",
              "status": "affected",
              "version": "4.7.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Marc Montpas"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "WPScan"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-20T23:06:10.636Z",
        "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
        "shortName": "WPScan"
      },
      "references": [
        {
          "tags": [
            "exploit",
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441"
        },
        {
          "tags": [
            "technical-description"
          ],
          "url": "https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "WordPress \u003c 6.3.2 - Unauthenticated Post Author Email Disclosure",
      "x_generator": {
        "engine": "WPScan CVE Generator"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
    "assignerShortName": "WPScan",
    "cveId": "CVE-2023-5561",
    "datePublished": "2023-10-16T19:39:10.424Z",
    "dateReserved": "2023-10-12T17:42:19.461Z",
    "dateUpdated": "2025-04-23T16:12:25.833Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-39999 (GCVE-0-2023-39999)

Vulnerability from cvelistv5 – Published: 2023-10-13 11:31 – Updated: 2025-02-13 17:03
VLAI?
Title
WordPress < 6.3.2 is vulnerable to Broken Access Control
Summary
Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
Impacted products
Vendor Product Version
WordPress.org WordPress Affected: 6.3 , ≤ 6.3.1 (custom)
Affected: 6.2 , ≤ 6.2.2 (custom)
Affected: 6.1 , ≤ 6.13 (custom)
Affected: 6.0 , ≤ 6.0.5 (custom)
Affected: 5.9 , ≤ 5.9.7 (custom)
Affected: 5.8 , ≤ 5.8.7 (custom)
Affected: 5.7 , ≤ 5.7.9 (custom)
Affected: 5.6 , ≤ 5.6.11 (custom)
Affected: 5.5 , ≤ 5.5.12 (custom)
Affected: 5.4 , ≤ 5.4.13 (custom)
Affected: 5.3 , ≤ 5.3.15 (custom)
Affected: 5.2 , ≤ 5.2.18 (custom)
Affected: 5.1 , ≤ 5.1.16 (custom)
Affected: 5.0 , ≤ 5.0.19 (custom)
Affected: 4.9 , ≤ 4.9.23 (custom)
Affected: 4.8 , ≤ 4.8.22 (custom)
Affected: 4.7 , ≤ 4.7.26 (custom)
Affected: 4.6 , ≤ 4.6.26 (custom)
Affected: 4.5 , ≤ 4.5.29 (custom)
Affected: 4.4 , ≤ 4.4.30 (custom)
Affected: 4.3 , ≤ 4.3.31 (custom)
Affected: 4.2 , ≤ 4.2.35 (custom)
Affected: 4.1 , ≤ 4.1.38 (custom)
Create a notification for this product.
Credits
Rafie Muhammad (Patchstack) Jb Audras (WordPress Security Team)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:18:10.210Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
          },
          {
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress.org",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.3.2",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.1",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.2",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.13",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.6",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.5",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.7",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.8.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.8.7",
              "status": "affected",
              "version": "5.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.7.10",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.7.9",
              "status": "affected",
              "version": "5.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.6.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.6.11",
              "status": "affected",
              "version": "5.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.5.13",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.5.12",
              "status": "affected",
              "version": "5.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.4.14",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.4.13",
              "status": "affected",
              "version": "5.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.3.16",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.3.15",
              "status": "affected",
              "version": "5.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.2.19",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.2.18",
              "status": "affected",
              "version": "5.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.1.17",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.1.16",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.0.20",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.19",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.9.24",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.9.23",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.8.23",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.8.22",
              "status": "affected",
              "version": "4.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.7.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.7.26",
              "status": "affected",
              "version": "4.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.6.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.6.26",
              "status": "affected",
              "version": "4.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.5.30",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.5.29",
              "status": "affected",
              "version": "4.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.4.31",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.4.30",
              "status": "affected",
              "version": "4.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.3.32",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.3.31",
              "status": "affected",
              "version": "4.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.2.36",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.2.35",
              "status": "affected",
              "version": "4.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.1.39",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.1.38",
              "status": "affected",
              "version": "4.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Rafie Muhammad (Patchstack)"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Jb Audras (WordPress Security Team)"
        }
      ],
      "datePublic": "2023-10-13T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Exposure of Sensitive Information to an Unauthorized Actor in WordPress\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.\u003c/span\u003e"
            }
          ],
          "value": "Exposure of Sensitive Information to an Unauthorized Actor in WordPress\u00a0from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-1",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-20T23:06:12.283Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
        },
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update to suitable (6.3.2,\u0026nbsp;6.2.3, 6.1.4, 6.0.6, 5.9.8, 5.8.8, 5.7.10, 5.6.12, 5.5.13, 5.4.14, 5.3.16, 5.2.19, 5.1.17, 5.0.20, 4.9.24, 4.8.23, 4.7.27, 4.6.27, 4.5.30, 4.4.31, 4.3.32, 4.2.36, 4.1.39) or a higher version."
            }
          ],
          "value": "Update to suitable (6.3.2,\u00a06.2.3, 6.1.4, 6.0.6, 5.9.8, 5.8.8, 5.7.10, 5.6.12, 5.5.13, 5.4.14, 5.3.16, 5.2.19, 5.1.17, 5.0.20, 4.9.24, 4.8.23, 4.7.27, 4.6.27, 4.5.30, 4.4.31, 4.3.32, 4.2.36, 4.1.39) or a higher version."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "WordPress \u003c 6.3.2 is vulnerable to Broken Access Control",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2023-39999",
    "datePublished": "2023-10-13T11:31:16.977Z",
    "dateReserved": "2023-08-08T11:43:05.859Z",
    "dateUpdated": "2025-02-13T17:03:20.665Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-58674 (GCVE-0-2025-58674)

Vulnerability from nvd – Published: 2025-09-23 18:47 – Updated: 2025-10-01 08:35 X_Open Source
VLAI?
Title
WordPress <= 6.8.2 - (Author+) Cross Site Scripting (XSS) Vulnerability
Summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 6.8 , ≤ 6.8.2 (custom)
Affected: 6.7 , ≤ 6.7.3 (custom)
Affected: 6.6 , ≤ 6.6.3 (custom)
Affected: 6.5 , ≤ 6.5.6 (custom)
Affected: 6.4 , ≤ 6.4.6 (custom)
Affected: 6.3 , ≤ 6.3.6 (custom)
Affected: 6.2 , ≤ 6.2.7 (custom)
Affected: 6.1 , ≤ 6.1.8 (custom)
Affected: 6.0 , ≤ 6.0.10 (custom)
Affected: 5.9 , ≤ 5.9.11 (custom)
Affected: 5.8 , ≤ 5.8.11 (custom)
Affected: 5.7 , ≤ 5.7.13 (custom)
Affected: 5.6 , ≤ 5.6.15 (custom)
Affected: 5.5 , ≤ 5.5.16 (custom)
Affected: 5.4 , ≤ 5.4.17 (custom)
Affected: 5.3 , ≤ 5.3.19 (custom)
Affected: 5.2 , ≤ 5.2.22 (custom)
Affected: 5.1 , ≤ 5.1.20 (custom)
Affected: 5.0 , ≤ 5.0.23 (custom)
Affected: 4.9 , ≤ 4.9.27 (custom)
Affected: 4.8 , ≤ 4.8.26 (custom)
Affected: 4.7 , ≤ 4.7.30 (custom)
Create a notification for this product.
Credits
savphill (Patchstack Bug Bounty Program) John Blackbourn (WordPress core security team lead)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-58674",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-23T19:15:09.886956Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-23T19:17:35.099Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "repo": "https://github.com/WordPress/WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.8.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.8.2",
              "status": "affected",
              "version": "6.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.7.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.7.3",
              "status": "affected",
              "version": "6.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.6.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.6.3",
              "status": "affected",
              "version": "6.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.5.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.5.6",
              "status": "affected",
              "version": "6.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.4.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.6",
              "status": "affected",
              "version": "6.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.3.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.6",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.7",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.9",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.1.8",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.11",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.10",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.11",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.8.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.8.11",
              "status": "affected",
              "version": "5.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.7.14",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.7.13",
              "status": "affected",
              "version": "5.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.6.16",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.6.15",
              "status": "affected",
              "version": "5.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.5.17",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.5.16",
              "status": "affected",
              "version": "5.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.4.18",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.4.17",
              "status": "affected",
              "version": "5.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.3.20",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.3.19",
              "status": "affected",
              "version": "5.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.2.23",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.2.22",
              "status": "affected",
              "version": "5.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.1.21",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.1.20",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.0.24",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.23",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.9.28",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.9.27",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.8.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.8.26",
              "status": "affected",
              "version": "4.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.7.31",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.7.30",
              "status": "affected",
              "version": "4.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "savphill (Patchstack Bug Bounty Program)"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "John Blackbourn (WordPress core security team lead)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003eImproper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.\u003c/span\u003e\u003cp\u003eThis issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.\u003c/p\u003e"
            }
          ],
          "value": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-01T08:35:39.048Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/wordpress/wordpress/wordpress/vulnerability/wordpress-wordpress-wordpress-6-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://wordpress.org/news/2025/09/wordpress-6-8-3-release/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
            }
          ],
          "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "tags": [
        "x_open-source"
      ],
      "title": "WordPress \u003c= 6.8.2 - (Author+) Cross Site Scripting (XSS) Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2025-58674",
    "datePublished": "2025-09-23T18:47:02.628Z",
    "dateReserved": "2025-09-03T09:03:46.831Z",
    "dateUpdated": "2025-10-01T08:35:39.048Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-58246 (GCVE-0-2025-58246)

Vulnerability from nvd – Published: 2025-09-23 17:17 – Updated: 2025-10-01 08:37 X_Open Source
VLAI?
Title
WordPress <= 6.8.2 - (Contributor+) Sensitive Data Exposure Vulnerability
Summary
Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it. This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
CWE
  • CWE-201 - Insertion of Sensitive Information Into Sent Data
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 6.8 , ≤ 6.8.2 (custom)
Affected: 6.7 , ≤ 6.7.3 (custom)
Affected: 6.6 , ≤ 6.6.3 (custom)
Affected: 6.5 , ≤ 6.5.6 (custom)
Affected: 6.4 , ≤ 6.4.6 (custom)
Affected: 6.3 , ≤ 6.3.6 (custom)
Affected: 6.2 , ≤ 6.2.7 (custom)
Affected: 6.1 , ≤ 6.1.8 (custom)
Affected: 6.0 , ≤ 6.0.10 (custom)
Affected: 5.9 , ≤ 5.9.11 (custom)
Affected: 5.8 , ≤ 5.8.11 (custom)
Affected: 5.7 , ≤ 5.7.13 (custom)
Affected: 5.6 , ≤ 5.6.15 (custom)
Affected: 5.5 , ≤ 5.5.16 (custom)
Affected: 5.4 , ≤ 5.4.17 (custom)
Affected: 5.3 , ≤ 5.3.19 (custom)
Affected: 5.2 , ≤ 5.2.22 (custom)
Affected: 5.1 , ≤ 5.1.20 (custom)
Affected: 5.0 , ≤ 5.0.23 (custom)
Affected: 4.9 , ≤ 4.9.27 (custom)
Affected: 4.8 , ≤ 4.8.26 (custom)
Affected: 4.7 , ≤ 4.7.30 (custom)
Create a notification for this product.
Credits
Abu Hurayra (Patchstack Bug Bounty Program) John Blackbourn (WordPress core security team lead) Timothy Jacobs Peter Wilson Mike Nelson
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-58246",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-23T18:30:39.501670Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-23T18:37:38.153Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "repo": "https://github.com/WordPress/WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.8.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.8.2",
              "status": "affected",
              "version": "6.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.7.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.7.3",
              "status": "affected",
              "version": "6.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.6.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.6.3",
              "status": "affected",
              "version": "6.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.5.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.5.6",
              "status": "affected",
              "version": "6.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.4.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.6",
              "status": "affected",
              "version": "6.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.3.7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.6",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.7",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.9",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.1.8",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.11",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.10",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.11",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.8.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.8.11",
              "status": "affected",
              "version": "5.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.7.14",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.7.13",
              "status": "affected",
              "version": "5.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.6.16",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.6.15",
              "status": "affected",
              "version": "5.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.5.17",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.5.16",
              "status": "affected",
              "version": "5.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.4.18",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.4.17",
              "status": "affected",
              "version": "5.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.3.20",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.3.19",
              "status": "affected",
              "version": "5.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.2.23",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.2.22",
              "status": "affected",
              "version": "5.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.1.21",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.1.20",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.0.24",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.23",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.9.28",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.9.27",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.8.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.8.26",
              "status": "affected",
              "version": "4.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.7.31",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.7.30",
              "status": "affected",
              "version": "4.7",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Abu Hurayra (Patchstack Bug Bounty Program)"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "John Blackbourn (WordPress core security team lead)"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Timothy Jacobs"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Peter Wilson"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Mike Nelson"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eInsertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it.\u003c/span\u003e\u003cbr\u003e\u003cp\u003eThis issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.\u003c/p\u003e"
            }
          ],
          "value": "Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it.\nThis issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-37",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-37 Retrieve Embedded Sensitive Data"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-201",
              "description": "CWE-201 Insertion of Sensitive Information Into Sent Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-01T08:37:01.207Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/wordpress/wordpress/wordpress/vulnerability/wordpress-wordpress-wordpress-6-8-2-sensitive-data-exposure-vulnerability?_s_id=cve"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://wordpress.org/news/2025/09/wordpress-6-8-3-release/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
            }
          ],
          "value": "Update WordPress to one of the following patched or higher versions: 6.8.3, 6.7.4, 6.6.4, 6.5.7, 6.4.7, 6.3.7, 6.2.8, 6.1.9, 6.0.11, 5.9.12, 5.8.12, 5.7.14, 5.6.16, 5.5.17, 5.4.18, 5.3.20, 5.2.23, 5.1.21, 5.0.24, 4.9.28, 4.8.27, or 4.7.31."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "tags": [
        "x_open-source"
      ],
      "title": "WordPress \u003c= 6.8.2 - (Contributor+) Sensitive Data Exposure Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2025-58246",
    "datePublished": "2025-09-23T17:17:12.399Z",
    "dateReserved": "2025-08-27T16:19:44.959Z",
    "dateUpdated": "2025-10-01T08:37:01.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-54352 (GCVE-0-2025-54352)

Vulnerability from nvd – Published: 2025-07-21 00:00 – Updated: 2025-07-21 18:15
VLAI?
Summary
WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior.
CWE
  • CWE-669 - Incorrect Resource Transfer Between Spheres
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 3.5 , ≤ 6.8.2 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54352",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-21T18:14:44.588087Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-21T18:15:20.785Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "lessThanOrEqual": "6.8.2",
              "status": "affected",
              "version": "3.5",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
                  "versionEndIncluding": "6.8.2",
                  "versionStartIncluding": "3.5",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-669",
              "description": "CWE-669 Incorrect Resource Transfer Between Spheres",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-21T04:27:10.814Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.imperva.com/blog/beware-a-threat-actor-could-steal-the-titles-of-your-private-and-draft-wordpress-posts/"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2025-54352",
    "datePublished": "2025-07-21T00:00:00.000Z",
    "dateReserved": "2025-07-21T00:00:00.000Z",
    "dateUpdated": "2025-07-21T18:15:20.785Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-4973 (GCVE-0-2022-4973)

Vulnerability from nvd – Published: 2024-10-16 06:43 – Updated: 2024-10-16 12:59
VLAI?
Title
WordPress Core < 6.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via use of the_meta(); function
Summary
WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Impacted products
Vendor Product Version
WordPress Foundation WordPress Affected: * , ≤ 3.6.1 (semver)
Affected: 3.7 , ≤ 3.7.38 (semver)
Affected: 3.8 , ≤ 3.8.38 (semver)
Affected: 3.9 , ≤ 3.9.36 (semver)
Affected: 4.0 , ≤ 4.0.35 (semver)
Affected: 4.1 , ≤ 4.1.35 (semver)
Affected: 4.2 , ≤ 4.2.32 (semver)
Affected: 4.3 , ≤ 4.3.28 (semver)
Affected: 4.4 , ≤ 4.4.27 (semver)
Affected: 4.5 , ≤ 4.5.26 (semver)
Affected: 4.6 , ≤ 4.6.23 (semver)
Affected: 4.7 , ≤ 4.7.23 (semver)
Affected: 4.8 , ≤ 4.8.19 (semver)
Affected: 4.9 , ≤ 4.9.20 (semver)
Affected: 5.0 , ≤ 5.0.16 (semver)
Affected: 5.1 , ≤ 5.1.13 (semver)
Affected: 5.2 , ≤ 5.2.15 (semver)
Affected: 5.3 , ≤ 5.3.12 (semver)
Affected: 5.4 , ≤ 5.4.10 (semver)
Affected: 5.5 , ≤ 5.5.9 (semver)
Affected: 5.6 , ≤ 5.6.8 (semver)
Affected: 5.7 , ≤ 5.7.6 (semver)
Affected: 5.8 , ≤ 5.8.4 (semver)
Affected: 5.9 , ≤ 5.9.3 (semver)
Affected: 6.0 , ≤ 6.0.1 (semver)
Create a notification for this product.
Credits
John Blackbourn
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-4973",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-16T12:59:16.874933Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-16T12:59:35.321Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress Foundation",
          "versions": [
            {
              "lessThanOrEqual": "3.6.1",
              "status": "affected",
              "version": "*",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "3.7.38",
              "status": "affected",
              "version": "3.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "3.8.38",
              "status": "affected",
              "version": "3.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "3.9.36",
              "status": "affected",
              "version": "3.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.0.35",
              "status": "affected",
              "version": "4.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.1.35",
              "status": "affected",
              "version": "4.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.2.32",
              "status": "affected",
              "version": "4.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.3.28",
              "status": "affected",
              "version": "4.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.4.27",
              "status": "affected",
              "version": "4.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.5.26",
              "status": "affected",
              "version": "4.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.6.23",
              "status": "affected",
              "version": "4.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.7.23",
              "status": "affected",
              "version": "4.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.8.19",
              "status": "affected",
              "version": "4.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.20",
              "status": "affected",
              "version": "4.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.0.16",
              "status": "affected",
              "version": "5.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.1.13",
              "status": "affected",
              "version": "5.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.2.15",
              "status": "affected",
              "version": "5.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.3.12",
              "status": "affected",
              "version": "5.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.10",
              "status": "affected",
              "version": "5.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.5.9",
              "status": "affected",
              "version": "5.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.6.8",
              "status": "affected",
              "version": "5.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.7.6",
              "status": "affected",
              "version": "5.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.8.4",
              "status": "affected",
              "version": "5.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.9.3",
              "status": "affected",
              "version": "5.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.0.1",
              "status": "affected",
              "version": "6.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "John Blackbourn"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-16T06:43:41.734Z",
        "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
        "shortName": "Wordfence"
      },
      "references": [
        {
          "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset/53961"
        },
        {
          "url": "https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/"
        },
        {
          "url": "https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2022-08-30T00:00:00.000+00:00",
          "value": "Disclosed"
        }
      ],
      "title": "WordPress Core \u003c 6.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via use of the_meta(); function"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
    "assignerShortName": "Wordfence",
    "cveId": "CVE-2022-4973",
    "datePublished": "2024-10-16T06:43:41.734Z",
    "dateReserved": "2024-10-15T18:03:44.130Z",
    "dateUpdated": "2024-10-16T12:59:35.321Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-4439 (GCVE-0-2024-4439)

Vulnerability from nvd – Published: 2024-05-03 05:32 – Updated: 2024-08-01 20:40
VLAI?
Summary
WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.
Assigner
Impacted products
Vendor Product Version
WordPress Foundation WordPress Affected: 6.0 , ≤ 6.0.7 (semver)
Affected: 6.1 , ≤ 6.1.5 (semver)
Affected: 6.2 , ≤ 6.2.4 (semver)
Affected: 6.3 , ≤ 6.3.3 (semver)
Affected: 6.4 , ≤ 6.4.3 (semver)
Affected: 6.5 , ≤ 6.5.1 (semver)
Create a notification for this product.
Credits
John Blackbourn Matthew Rollings
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:wordpress:wordpress:6.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "wordpress",
            "vendor": "wordpress",
            "versions": [
              {
                "lessThanOrEqual": "6.5.1",
                "status": "affected",
                "version": "6.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-4439",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-09T19:37:57.427844Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-80",
                "description": "CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:54:08.655Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:40:47.361Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cve"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=57950%40%2F\u0026new=57950%40%2F\u0026sfp_email=\u0026sfph_mail=#file3"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress Foundation",
          "versions": [
            {
              "lessThanOrEqual": "6.0.7",
              "status": "affected",
              "version": "6.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.5",
              "status": "affected",
              "version": "6.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.2.4",
              "status": "affected",
              "version": "6.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.3.3",
              "status": "affected",
              "version": "6.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.4.3",
              "status": "affected",
              "version": "6.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.1",
              "status": "affected",
              "version": "6.5",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "John Blackbourn"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Matthew Rollings"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author\u0027s avatar."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-03T05:32:34.988Z",
        "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
        "shortName": "Wordfence"
      },
      "references": [
        {
          "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cve"
        },
        {
          "url": "https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=57950%40%2F\u0026new=57950%40%2F\u0026sfp_email=\u0026sfph_mail=#file3"
        },
        {
          "url": "https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php"
        },
        {
          "url": "https://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-04-09T00:00:00.000+00:00",
          "value": "Disclosed"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
    "assignerShortName": "Wordfence",
    "cveId": "CVE-2024-4439",
    "datePublished": "2024-05-03T05:32:34.988Z",
    "dateReserved": "2024-05-02T16:33:12.426Z",
    "dateUpdated": "2024-08-01T20:40:47.361Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-31210 (GCVE-0-2024-31210)

Vulnerability from nvd – Published: 2024-04-04 22:59 – Updated: 2024-08-02 01:46
VLAI?
Title
PHP file upload bypass via Plugin installer
Summary
WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.
CWE
  • CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
References
Impacted products
Vendor Product Version
WordPress wordpress-develop Affected: >= 6.4.0, < 6.4.3
Affected: >= 6.3.0, < 6.3.3
Affected: >= 6.2.0, < 6.2.4
Affected: >= 6.1.0, < 6.1.5
Affected: >= 6.0.0, < 6.0.7
Affected: >= 5.9.0, < 5.9.9
Affected: >= 5.8.0, < 5.8.9
Affected: >= 5.7.0, < 5.7.11
Affected: >= 5.6.0, < 5.6.13
Affected: >= 5.5.0, < 5.5.14
Affected: >= 5.4.0, < 5.4.15
Affected: >= 5.3.0, < 5.3.17
Affected: >= 5.2.0, < 5.2.20
Affected: >= 5.1.0, < 5.1.18
Affected: >= 5.0.0, < 5.0.21
Affected: >= 4.9.0, < 4.9.25
Affected: >= 4.8.0, < 4.8.24
Affected: >= 4.7.0, < 4.7.28
Affected: >= 4.6.0, < 4.6.28
Affected: >= 4.5.0, < 4.5.31
Affected: >= 4.4.0, < 4.4.32
Affected: >= 4.3.0, < 4.3.33
Affected: >= 4.2.0, < 4.2.37
Affected: < 4.1.40
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:wordpress:wordpress-develop:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "wordpress-develop",
            "vendor": "wordpress",
            "versions": [
              {
                "lessThan": "6.4.3",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-31210",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-05T13:59:35.660459Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-31T19:47:42.302Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T01:46:04.580Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "wordpress-develop",
          "vendor": "WordPress",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 6.4.0, \u003c 6.4.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.3.0, \u003c 6.3.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.2.0, \u003c 6.2.4"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.1.0, \u003c 6.1.5"
            },
            {
              "status": "affected",
              "version": "\u003e= 6.0.0, \u003c 6.0.7"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.9.0, \u003c 5.9.9"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.8.0, \u003c 5.8.9"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.7.0, \u003c 5.7.11"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.6.0, \u003c 5.6.13"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.5.0, \u003c 5.5.14"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.4.0, \u003c 5.4.15"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.3.0, \u003c 5.3.17"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.2.0, \u003c 5.2.20"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.1.0, \u003c 5.1.18"
            },
            {
              "status": "affected",
              "version": "\u003e= 5.0.0, \u003c 5.0.21"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.9.0, \u003c 4.9.25"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.8.0, \u003c 4.8.24"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.7.0, \u003c 4.7.28"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.6.0, \u003c 4.6.28"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.5.0, \u003c 4.5.31"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.4.0, \u003c 4.4.32"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.3.0, \u003c 4.3.33"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.2.0, \u003c 4.2.37"
            },
            {
              "status": "affected",
              "version": "\u003c 4.1.40"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress is an open publishing platform for the Web. It\u0027s possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -\u003e Add New -\u003e Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it\u0027s otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-434",
              "description": "CWE-434: Unrestricted Upload of File with Dangerous Type",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-04T22:59:28.955Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r"
        }
      ],
      "source": {
        "advisory": "GHSA-x79f-xrjv-jx5r",
        "discovery": "UNKNOWN"
      },
      "title": "PHP file upload bypass via Plugin installer"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-31210",
    "datePublished": "2024-04-04T22:59:28.955Z",
    "dateReserved": "2024-03-29T14:16:31.900Z",
    "dateUpdated": "2024-08-02T01:46:04.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-31211 (GCVE-0-2024-31211)

Vulnerability from nvd – Published: 2024-04-04 23:00 – Updated: 2024-08-02 01:46
VLAI?
Title
Remote Code Execution in `WP_HTML_Token`
Summary
WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.
CWE
  • CWE-502 - Deserialization of Untrusted Data
Assigner
References
Impacted products
Vendor Product Version
WordPress wordpress-develop Affected: >= 6.4.0 < 6.4.2
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-31211",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-05T14:00:20.723760Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:36:13.480Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T01:46:04.743Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "wordpress-develop",
          "vendor": "WordPress",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 6.4.0 \u003c 6.4.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502: Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-04T23:00:17.782Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653"
        }
      ],
      "source": {
        "advisory": "GHSA-m257-q4m5-j653",
        "discovery": "UNKNOWN"
      },
      "title": "Remote Code Execution in `WP_HTML_Token`"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-31211",
    "datePublished": "2024-04-04T23:00:17.782Z",
    "dateReserved": "2024-03-29T14:16:31.900Z",
    "dateUpdated": "2024-08-02T01:46:04.743Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5561 (GCVE-0-2023-5561)

Vulnerability from nvd – Published: 2023-10-16 19:39 – Updated: 2025-04-23 16:12
VLAI?
Title
WordPress < 6.3.2 - Unauthenticated Post Author Email Disclosure
Summary
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
Assigner
Impacted products
Vendor Product Version
WordPress WordPress Affected: 6.3.0 , < 6.3.2 (semver)
Affected: 6.2.0 , < 6.2.3 (semver)
Affected: 6.1.0 , < 6.1.4 (semver)
Affected: 6.0.0 , < 6.0.6 (semver)
Affected: 5.9.0 , < 5.9.8 (semver)
Affected: 5.8.0 , < 5.8.8 (semver)
Affected: 5.7.0 , < 5.7.10 (semver)
Affected: 5.6.0 , < 5.6.12 (semver)
Affected: 5.5.0 , < 5.5.13 (semver)
Affected: 5.4.0 , < 5.4.14 (semver)
Affected: 5.3.0 , < 5.3.16 (semver)
Affected: 5.2.0 , < 5.2.19 (semver)
Affected: 5.0.0 , < 5.0.20 (semver)
Affected: 4.9.0 , < 4.9.24 (semver)
Affected: 4.8.0 , < 4.8.23 (semver)
Affected: 4.7.0 , < 4.7.27 (semver)
Create a notification for this product.
Credits
Marc Montpas WPScan
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:59:44.898Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "exploit",
              "vdb-entry",
              "technical-description",
              "x_transferred"
            ],
            "url": "https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441"
          },
          {
            "tags": [
              "technical-description",
              "x_transferred"
            ],
            "url": "https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-5561",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-23T16:07:50.654852Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-23T16:12:25.833Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress",
          "versions": [
            {
              "lessThan": "6.3.2",
              "status": "affected",
              "version": "6.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.2.3",
              "status": "affected",
              "version": "6.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.1.4",
              "status": "affected",
              "version": "6.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "6.0.6",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.9.8",
              "status": "affected",
              "version": "5.9.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.8.8",
              "status": "affected",
              "version": "5.8.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.7.10",
              "status": "affected",
              "version": "5.7.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.6.12",
              "status": "affected",
              "version": "5.6.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.5.13",
              "status": "affected",
              "version": "5.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.4.14",
              "status": "affected",
              "version": "5.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.3.16",
              "status": "affected",
              "version": "5.3.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.2.19",
              "status": "affected",
              "version": "5.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "5.0.20",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.9.24",
              "status": "affected",
              "version": "4.9.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.8.23",
              "status": "affected",
              "version": "4.8.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.7.27",
              "status": "affected",
              "version": "4.7.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Marc Montpas"
        },
        {
          "lang": "en",
          "type": "coordinator",
          "value": "WPScan"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-20T23:06:10.636Z",
        "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
        "shortName": "WPScan"
      },
      "references": [
        {
          "tags": [
            "exploit",
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441"
        },
        {
          "tags": [
            "technical-description"
          ],
          "url": "https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "WordPress \u003c 6.3.2 - Unauthenticated Post Author Email Disclosure",
      "x_generator": {
        "engine": "WPScan CVE Generator"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
    "assignerShortName": "WPScan",
    "cveId": "CVE-2023-5561",
    "datePublished": "2023-10-16T19:39:10.424Z",
    "dateReserved": "2023-10-12T17:42:19.461Z",
    "dateUpdated": "2025-04-23T16:12:25.833Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-39999 (GCVE-0-2023-39999)

Vulnerability from nvd – Published: 2023-10-13 11:31 – Updated: 2025-02-13 17:03
VLAI?
Title
WordPress < 6.3.2 is vulnerable to Broken Access Control
Summary
Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
Impacted products
Vendor Product Version
WordPress.org WordPress Affected: 6.3 , ≤ 6.3.1 (custom)
Affected: 6.2 , ≤ 6.2.2 (custom)
Affected: 6.1 , ≤ 6.13 (custom)
Affected: 6.0 , ≤ 6.0.5 (custom)
Affected: 5.9 , ≤ 5.9.7 (custom)
Affected: 5.8 , ≤ 5.8.7 (custom)
Affected: 5.7 , ≤ 5.7.9 (custom)
Affected: 5.6 , ≤ 5.6.11 (custom)
Affected: 5.5 , ≤ 5.5.12 (custom)
Affected: 5.4 , ≤ 5.4.13 (custom)
Affected: 5.3 , ≤ 5.3.15 (custom)
Affected: 5.2 , ≤ 5.2.18 (custom)
Affected: 5.1 , ≤ 5.1.16 (custom)
Affected: 5.0 , ≤ 5.0.19 (custom)
Affected: 4.9 , ≤ 4.9.23 (custom)
Affected: 4.8 , ≤ 4.8.22 (custom)
Affected: 4.7 , ≤ 4.7.26 (custom)
Affected: 4.6 , ≤ 4.6.26 (custom)
Affected: 4.5 , ≤ 4.5.29 (custom)
Affected: 4.4 , ≤ 4.4.30 (custom)
Affected: 4.3 , ≤ 4.3.31 (custom)
Affected: 4.2 , ≤ 4.2.35 (custom)
Affected: 4.1 , ≤ 4.1.38 (custom)
Create a notification for this product.
Credits
Rafie Muhammad (Patchstack) Jb Audras (WordPress Security Team)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:18:10.210Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
          },
          {
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WordPress",
          "vendor": "WordPress.org",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.3.2",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.3.1",
              "status": "affected",
              "version": "6.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.2.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.2",
              "status": "affected",
              "version": "6.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.1.4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.13",
              "status": "affected",
              "version": "6.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "6.0.6",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.5",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.9.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.9.7",
              "status": "affected",
              "version": "5.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.8.8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.8.7",
              "status": "affected",
              "version": "5.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.7.10",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.7.9",
              "status": "affected",
              "version": "5.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.6.12",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.6.11",
              "status": "affected",
              "version": "5.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.5.13",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.5.12",
              "status": "affected",
              "version": "5.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.4.14",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.4.13",
              "status": "affected",
              "version": "5.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.3.16",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.3.15",
              "status": "affected",
              "version": "5.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.2.19",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.2.18",
              "status": "affected",
              "version": "5.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.1.17",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.1.16",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "5.0.20",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.19",
              "status": "affected",
              "version": "5.0",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.9.24",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.9.23",
              "status": "affected",
              "version": "4.9",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.8.23",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.8.22",
              "status": "affected",
              "version": "4.8",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.7.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.7.26",
              "status": "affected",
              "version": "4.7",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.6.27",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.6.26",
              "status": "affected",
              "version": "4.6",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.5.30",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.5.29",
              "status": "affected",
              "version": "4.5",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.4.31",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.4.30",
              "status": "affected",
              "version": "4.4",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.3.32",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.3.31",
              "status": "affected",
              "version": "4.3",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.2.36",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.2.35",
              "status": "affected",
              "version": "4.2",
              "versionType": "custom"
            },
            {
              "changes": [
                {
                  "at": "4.1.39",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.1.38",
              "status": "affected",
              "version": "4.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Rafie Muhammad (Patchstack)"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Jb Audras (WordPress Security Team)"
        }
      ],
      "datePublic": "2023-10-13T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Exposure of Sensitive Information to an Unauthorized Actor in WordPress\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.\u003c/span\u003e"
            }
          ],
          "value": "Exposure of Sensitive Information to an Unauthorized Actor in WordPress\u00a0from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-1",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-20T23:06:12.283Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
        },
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update to suitable (6.3.2,\u0026nbsp;6.2.3, 6.1.4, 6.0.6, 5.9.8, 5.8.8, 5.7.10, 5.6.12, 5.5.13, 5.4.14, 5.3.16, 5.2.19, 5.1.17, 5.0.20, 4.9.24, 4.8.23, 4.7.27, 4.6.27, 4.5.30, 4.4.31, 4.3.32, 4.2.36, 4.1.39) or a higher version."
            }
          ],
          "value": "Update to suitable (6.3.2,\u00a06.2.3, 6.1.4, 6.0.6, 5.9.8, 5.8.8, 5.7.10, 5.6.12, 5.5.13, 5.4.14, 5.3.16, 5.2.19, 5.1.17, 5.0.20, 4.9.24, 4.8.23, 4.7.27, 4.6.27, 4.5.30, 4.4.31, 4.3.32, 4.2.36, 4.1.39) or a higher version."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "WordPress \u003c 6.3.2 is vulnerable to Broken Access Control",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2023-39999",
    "datePublished": "2023-10-13T11:31:16.977Z",
    "dateReserved": "2023-08-08T11:43:05.859Z",
    "dateUpdated": "2025-02-13T17:03:20.665Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

FKIE_CVE-2022-4973

Vulnerability from fkie_nvd - Published: 2024-10-16 07:15 - Updated: 2024-10-30 15:58
Summary
WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.
Impacted products
Vendor Product Version
wordpress wordpress *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A54B0FB0-4E00-4D19-A948-394A668C9312",
              "versionEndIncluding": "6.0.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page."
    },
    {
      "lang": "es",
      "value": "WordPress Core, en versiones hasta la 6.0.2, es vulnerable a cross-site scripting almacenado autenticados que pueden ser explotadas por usuarios con acceso al editor de publicaciones y p\u00e1ginas de WordPress, que generalmente consisten en autores, colaboradores y editores, lo que hace posible inyectar secuencias de comandos web arbitrarias en publicaciones y p\u00e1ginas que se ejecutan si se llama a la funci\u00f3n the_meta(); en esa p\u00e1gina."
    }
  ],
  "id": "CVE-2022-4973",
  "lastModified": "2024-10-30T15:58:30.907",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 2.7,
        "source": "security@wordfence.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-10-16T07:15:12.497",
  "references": [
    {
      "source": "security@wordfence.com",
      "tags": [
        "Patch"
      ],
      "url": "https://core.trac.wordpress.org/changeset/53961"
    },
    {
      "source": "security@wordfence.com",
      "tags": [
        "Release Notes"
      ],
      "url": "https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/"
    },
    {
      "source": "security@wordfence.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/"
    },
    {
      "source": "security@wordfence.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve"
    }
  ],
  "sourceIdentifier": "security@wordfence.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@wordfence.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2024-4439

Vulnerability from fkie_nvd - Published: 2024-05-03 06:15 - Updated: 2026-01-05 15:35
Summary
WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.
References
security@wordfence.comhttps://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.phpPatch
security@wordfence.comhttps://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=57950%40%2F&new=57950%40%2F&sfp_email=&sfph_mail=#file3Patch
security@wordfence.comhttps://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/Vendor Advisory
security@wordfence.comhttps://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/Exploit, Third Party Advisory
security@wordfence.comhttps://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cveThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.phpPatch
af854a3a-2127-422b-91ae-364da2661108https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=57950%40%2F&new=57950%40%2F&sfp_email=&sfph_mail=#file3Patch
af854a3a-2127-422b-91ae-364da2661108https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cveThird Party Advisory

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6742B863-A9F5-467B-85D8-C75C18614252",
              "versionEndIncluding": "6.0.7",
              "versionStartIncluding": "6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "501FF79E-083A-4B24-8E57-F0C188FAB4AE",
              "versionEndIncluding": "6.1.5",
              "versionStartIncluding": "6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46440E9-304F-45FD-A64C-5999AD108344",
              "versionEndIncluding": "6.2.4",
              "versionStartIncluding": "6.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "248E3821-B5A6-4670-872B-8E98617CC71B",
              "versionEndIncluding": "6.3.3",
              "versionStartIncluding": "6.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B5EA04-95EA-4668-932F-C4DAE2D0C7ED",
              "versionEndIncluding": "6.4.3",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E49E358-13CD-415A-A9CE-11455B36B886",
              "versionEndIncluding": "6.5.1",
              "versionStartIncluding": "6.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author\u0027s avatar."
    },
    {
      "lang": "es",
      "value": "WordPress Core es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de nombres para mostrar de usuario en el bloque Avatar en varias versiones hasta 6.5.2 debido a una salida insuficiente que se escapa en el nombre para mostrar. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Adem\u00e1s, tambi\u00e9n hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que tienen el bloque de comentarios presente y muestran el avatar del autor del comentario."
    }
  ],
  "id": "CVE-2024-4439",
  "lastModified": "2026-01-05T15:35:42.727",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.7,
        "source": "security@wordfence.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-05-03T06:15:14.947",
  "references": [
    {
      "source": "security@wordfence.com",
      "tags": [
        "Patch"
      ],
      "url": "https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php"
    },
    {
      "source": "security@wordfence.com",
      "tags": [
        "Patch"
      ],
      "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=57950%40%2F\u0026new=57950%40%2F\u0026sfp_email=\u0026sfph_mail=#file3"
    },
    {
      "source": "security@wordfence.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/"
    },
    {
      "source": "security@wordfence.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/"
    },
    {
      "source": "security@wordfence.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cve"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://core.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=57950%40%2F\u0026new=57950%40%2F\u0026sfp_email=\u0026sfph_mail=#file3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.wordfence.com/blog/2024/04/unauthenticated-stored-cross-site-scripting-vulnerability-patched-in-wordpress-core/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e363c09a-4381-4b3a-951c-9a0ff5669016?source=cve"
    }
  ],
  "sourceIdentifier": "security@wordfence.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-80"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2024-31210

Vulnerability from fkie_nvd - Published: 2024-04-04 23:15 - Updated: 2026-01-07 20:13
Summary
WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "28591CBB-53BC-41EE-818A-2AEEB5988BA7",
              "versionEndExcluding": "4.1.40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D0FFF38-4F06-48C7-8F2D-75A964A8D388",
              "versionEndExcluding": "4.2.37",
              "versionStartIncluding": "4.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF0C8207-878B-4ABE-825F-25571365640D",
              "versionEndExcluding": "4.3.33",
              "versionStartIncluding": "4.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0D8C302-4CC6-44C0-B7F1-2CE75E6225EF",
              "versionEndExcluding": "4.4.32",
              "versionStartIncluding": "4.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "223C2067-C3FE-4F0F-ABA6-C2F4F8BBAFA1",
              "versionEndExcluding": "4.5.31",
              "versionStartIncluding": "4.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A974958-88EA-4E79-AF6C-FC2780C45E32",
              "versionEndExcluding": "4.6.28",
              "versionStartIncluding": "4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B504D16-55D6-4C25-9A43-6065CED8902F",
              "versionEndExcluding": "4.7.28",
              "versionStartIncluding": "4.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FD6506B-A4F1-4702-904E-82606B7C897B",
              "versionEndExcluding": "4.8.24",
              "versionStartIncluding": "4.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0EAA05-3690-433E-B256-AB5146719430",
              "versionEndExcluding": "4.9.25",
              "versionStartIncluding": "4.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EEE265-7355-4FE8-9825-D67FE5CA34D5",
              "versionEndExcluding": "5.0.21",
              "versionStartIncluding": "5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24AF2ECD-C067-41E3-89D5-6A3D315E2146",
              "versionEndExcluding": "5.1.18",
              "versionStartIncluding": "5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C75C1A-B0BF-4341-94CB-2F29C4D23147",
              "versionEndExcluding": "5.2.20",
              "versionStartIncluding": "5.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "897538FB-FD18-4A42-B532-573395660021",
              "versionEndExcluding": "5.3.17",
              "versionStartIncluding": "5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F76A82A-0FC8-4C28-AA9B-FDD7C8974BDC",
              "versionEndExcluding": "5.4.15",
              "versionStartIncluding": "5.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "053189C7-B641-4E28-9651-BAE2ADF86D85",
              "versionEndExcluding": "5.5.14",
              "versionStartIncluding": "5.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "042EA872-61F3-44BE-BC41-C7A5D5211E25",
              "versionEndExcluding": "5.6.13",
              "versionStartIncluding": "5.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBEFA980-0957-4D93-A638-68C153A6B479",
              "versionEndExcluding": "5.7.11",
              "versionStartIncluding": "5.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C384C6-B07F-4F55-A364-6DF10943F97B",
              "versionEndExcluding": "5.8.9",
              "versionStartIncluding": "5.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F39FFEE-687B-4FCC-8362-3B8584AFD7A7",
              "versionEndExcluding": "5.9.9",
              "versionStartIncluding": "5.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C0B8A35-3707-408E-ABE0-25E9BA3A16A3",
              "versionEndExcluding": "6.0.7",
              "versionStartIncluding": "6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36750935-4B9E-4A86-98DC-CADC6EE939FB",
              "versionEndExcluding": "6.1.5",
              "versionStartIncluding": "6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "946F95A3-7267-467B-825F-46131DC58347",
              "versionEndExcluding": "6.2.4",
              "versionStartIncluding": "6.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F37A23-FF97-4473-8980-45B1A8638729",
              "versionEndExcluding": "6.3.3",
              "versionStartIncluding": "6.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FD53FC8-05F8-41CA-AA08-0AA925E1B311",
              "versionEndExcluding": "6.4.3",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "WordPress is an open publishing platform for the Web. It\u0027s possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -\u003e Add New -\u003e Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it\u0027s otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.\n"
    },
    {
      "lang": "es",
      "value": "WordPress es una plataforma de publicaci\u00f3n abierta para la Web. Es posible que un usuario administrativo env\u00ede un archivo de un tipo que no sea un archivo zip como un nuevo complemento en la pantalla Complementos -\u0026gt; Agregar nuevo -\u0026gt; Cargar complemento en WordPress. Si se solicitan credenciales FTP para la instalaci\u00f3n (para mover el archivo a un lugar fuera del directorio `uploads`), entonces el archivo cargado permanece disponible temporalmente en la librer\u00eda multimedia a pesar de que no est\u00e9 permitido. Si la constante `DISALLOW_FILE_EDIT` se establece en `true` en el sitio _y_ se requieren credenciales FTP al cargar un nuevo tema o complemento, entonces esto t\u00e9cnicamente permite un RCE cuando el usuario no tendr\u00eda medios para ejecutar c\u00f3digo PHP arbitrario. Este problema _solo_ afecta a los usuarios de nivel de administrador en instalaciones de un solo sitio y a los usuarios de nivel de superadministrador en instalaciones de m\u00faltiples sitios donde, de lo contrario, se espera que el usuario no tenga permiso para cargar o ejecutar c\u00f3digo PHP arbitrario. Los usuarios de niveles inferiores no se ven afectados. Los sitios donde la constante `DISALLOW_FILE_MODS` est\u00e1 establecida en `true` no se ven afectados. Los sitios donde un usuario administrativo no necesita ingresar credenciales FTP o tiene acceso a las credenciales FTP v\u00e1lidas no se ven afectados. El problema se solucion\u00f3 en WordPress 6.4.3 el 30 de enero de 2024 y se actualiz\u00f3 a las versiones 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13. 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3. 33, 4.2.37 y 4.1.40. Hay una soluci\u00f3n disponible. Si la constante `DISALLOW_FILE_MODS` se define como `true`, ning\u00fan usuario podr\u00e1 cargar un complemento y, por lo tanto, este problema no ser\u00e1 explotable."
    }
  ],
  "id": "CVE-2024-31210",
  "lastModified": "2026-01-07T20:13:40.710",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 6.0,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-04-04T23:15:16.127",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-434"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2024-31211

Vulnerability from fkie_nvd - Published: 2024-04-04 23:15 - Updated: 2026-01-02 20:12
Summary
WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.
Impacted products
Vendor Product Version
wordpress wordpress *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A04CEB33-E49D-47F8-BABE-BDA9DB077709",
              "versionEndExcluding": "6.4.2",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected."
    },
    {
      "lang": "es",
      "value": "WordPress es una plataforma de publicaci\u00f3n abierta para la Web. La deserializaci\u00f3n de instancias de la clase `WP_HTML_Token` permite la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de su m\u00e9todo m\u00e1gico `__destruct()`. Este problema se solucion\u00f3 en WordPress 6.4.2 el 6 de diciembre de 2023. Las versiones anteriores a la 6.4.0 no se ven afectadas."
    }
  ],
  "id": "CVE-2024-31211",
  "lastModified": "2026-01-02T20:12:03.303",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-04-04T23:15:16.333",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-502"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2023-5561

Vulnerability from fkie_nvd - Published: 2023-10-16 20:15 - Updated: 2025-04-23 17:16
Summary
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F659EB-27E2-4149-883B-341A0DD80EB0",
              "versionEndExcluding": "4.7.27",
              "versionStartIncluding": "4.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C14B71C7-DD47-4900-8F84-8F7A594E555B",
              "versionEndExcluding": "4.8.23",
              "versionStartIncluding": "4.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C274BA0-BBD2-45EC-82EC-CFE0BA0AED0F",
              "versionEndExcluding": "4.9.24",
              "versionStartIncluding": "4.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A923BA69-D672-4133-82EF-AFDDA5DD12DA",
              "versionEndExcluding": "5.0.20",
              "versionStartIncluding": "5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A6E55DF-A05B-4420-B63B-0D1BEFB180EA",
              "versionEndExcluding": "5.1.17",
              "versionStartIncluding": "5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC188A6D-DBA2-48CA-B6E2-EBA859AE9FEF",
              "versionEndExcluding": "5.2.19",
              "versionStartIncluding": "5.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68F28900-3DC1-45F3-9B62-3347F14ADAB0",
              "versionEndExcluding": "5.3.16",
              "versionStartIncluding": "5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5470536-6271-4D35-AB38-55DAEEC87980",
              "versionEndExcluding": "5.4.14",
              "versionStartIncluding": "5.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "274301F3-C6E4-40DF-90D4-3F597F715150",
              "versionEndExcluding": "5.5.13",
              "versionStartIncluding": "5.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF1391A3-84EA-469F-AB2A-B6A6AB84703C",
              "versionEndExcluding": "5.6.12",
              "versionStartIncluding": "5.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDF17959-9854-47FE-87D2-1DEE39B9F460",
              "versionEndExcluding": "5.7.10",
              "versionStartIncluding": "5.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3F0CA8-9EAD-456A-A79E-D02473FF6075",
              "versionEndExcluding": "5.8.8",
              "versionStartIncluding": "5.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "358A2584-34C0-4E5A-BA24-855FD2092E71",
              "versionEndExcluding": "5.9.8",
              "versionStartIncluding": "5.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C359F62-24DD-4684-9806-7FBB3F5C10FC",
              "versionEndExcluding": "6.0.6",
              "versionStartIncluding": "6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "680CD6CE-8815-44F8-9689-4B2155041E19",
              "versionEndExcluding": "6.1.4",
              "versionStartIncluding": "6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C10ED637-5054-4830-BE95-6F2F1194CCD2",
              "versionEndExcluding": "6.2.3",
              "versionStartIncluding": "6.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED48F8A-D2AC-45FE-9B5F-231A0666A897",
              "versionEndExcluding": "6.3.2",
              "versionStartIncluding": "6.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack"
    },
    {
      "lang": "es",
      "value": "El complemento Popup Builder de WordPress hasta la versi\u00f3n 4.1.15 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting almacenados incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
    }
  ],
  "id": "CVE-2023-5561",
  "lastModified": "2025-04-23T17:16:50.853",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-10-16T20:15:18.073",
  "references": [
    {
      "source": "contact@wpscan.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
    },
    {
      "source": "contact@wpscan.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/"
    },
    {
      "source": "contact@wpscan.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441"
    }
  ],
  "sourceIdentifier": "contact@wpscan.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-39999

Vulnerability from fkie_nvd - Published: 2023-10-13 12:15 - Updated: 2024-11-21 08:16
Summary
Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.
References
audit@patchstack.comhttps://lists.debian.org/debian-lts-announce/2023/11/msg00014.htmlMailing List, Third Party Advisory
audit@patchstack.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/Mailing List, Third Party Advisory
audit@patchstack.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/Mailing List, Third Party Advisory
audit@patchstack.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/Mailing List, Third Party Advisory
audit@patchstack.comhttps://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cveExploit, Patch, Third Party Advisory
audit@patchstack.comhttps://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cveThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/11/msg00014.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cveExploit, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cveThird Party Advisory

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABB9B812-77A2-48A2-B20C-F93F1927074D",
              "versionEndIncluding": "4.1.38",
              "versionStartIncluding": "4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E1AF690-CF5B-43EC-BFC3-0D3BFBD68026",
              "versionEndIncluding": "4.2.35",
              "versionStartIncluding": "4.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16E8601-4A33-46DD-8ED7-4D0366D627C6",
              "versionEndIncluding": "4.3.31",
              "versionStartIncluding": "4.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5045F892-3036-4887-9044-9560EC8E4CC4",
              "versionEndIncluding": "4.4.30",
              "versionStartIncluding": "4.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "847B4EEB-CE33-4FE7-BE01-7F26FA214CA7",
              "versionEndIncluding": "4.5.29",
              "versionStartIncluding": "4.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F10FE77A-E6E4-4F22-ACD9-B5302D330AEC",
              "versionEndIncluding": "4.6.26",
              "versionStartIncluding": "4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FF60CD-3303-4B7E-A341-1336A1B59B02",
              "versionEndIncluding": "4.7.26",
              "versionStartIncluding": "4.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DB9AC76-3041-4B4C-8015-3FB4F997F3D0",
              "versionEndIncluding": "4.8.22",
              "versionStartIncluding": "4.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C37B8606-CDC9-41AE-A215-8C4CAA181FE2",
              "versionEndIncluding": "4.9.23",
              "versionStartIncluding": "4.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F999E7C-2623-456C-BB90-0477F797FEEF",
              "versionEndIncluding": "5.0.19",
              "versionStartIncluding": "5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D3ED9AF-2678-45E9-9D05-87DDB335B3A8",
              "versionEndIncluding": "5.1.16",
              "versionStartIncluding": "5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AC73861-C8F7-4CF3-BD3E-E192B21C6E9A",
              "versionEndIncluding": "5.2.18",
              "versionStartIncluding": "5.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C8561A-B374-43F1-A075-B3C0CAA34790",
              "versionEndIncluding": "5.3.15",
              "versionStartIncluding": "5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D20123C6-5E39-41D4-8231-8E02B78997BC",
              "versionEndIncluding": "5.4.13",
              "versionStartIncluding": "5.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C69CC301-A008-4BAF-A207-0892673CAEFF",
              "versionEndIncluding": "5.5.12",
              "versionStartIncluding": "5.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A83D406-52C7-4655-9048-9393A3D23DA4",
              "versionEndIncluding": "5.6.11",
              "versionStartIncluding": "5.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6797639F-F04C-4BFA-B37B-98E9D23D8E33",
              "versionEndIncluding": "5.7.9",
              "versionStartIncluding": "5.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CD23244-9849-453C-A206-4563997EF5EE",
              "versionEndIncluding": "5.8.7",
              "versionStartIncluding": "5.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D5D6E9-387D-4A4B-A613-0E0B9D74B8F1",
              "versionEndIncluding": "5.9.7",
              "versionStartIncluding": "5.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D0A0B36-9A2F-415A-A404-EE0FF6BC63A3",
              "versionEndIncluding": "6.0.5",
              "versionStartIncluding": "6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A85EAB94-7EE7-4B4D-82E6-132FCF8662C4",
              "versionEndIncluding": "6.1.3",
              "versionStartIncluding": "6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B55FDB69-E699-43A1-8575-52E0B33F8863",
              "versionEndIncluding": "6.2.2",
              "versionStartIncluding": "6.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED48F8A-D2AC-45FE-9B5F-231A0666A897",
              "versionEndExcluding": "6.3.2",
              "versionStartIncluding": "6.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Exposure of Sensitive Information to an Unauthorized Actor in WordPress\u00a0from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38."
    },
    {
      "lang": "es",
      "value": "Exposici\u00f3n de Informaci\u00f3n Confidencial a un Actor No Autorizado en WordPress desde 6.3 hasta 6.3.1, desde 6.2 hasta 6.2.2, desde 6.1 hasta 6.13, desde 6.0 hasta 6.0.5, desde 5.9 hasta 5.9.7, desde 5.8 hasta 5.8.7, del 5.7 al 5.7.9, del 5.6 al 5.6.11, del 5.5 al 5.5.12, del 5.4 al 5.4.13, del 5.3 al 5.3.15, del 5.2 al 5.2.18, del 5.1 al 5.1.16, del 5.0 al 5.0.19, del 4.9 al 4.9.23, del 4.8 al 4.8.22, del 4.7 al 4.7.26, del 4.6 al 4.6.26, del 4.5 al 4.5.29, del 4.4 al 4.4.30, del 4.3 al 4.3.31, del 4.2 al 4.2.35, del 4.1 al 4.1.38."
    }
  ],
  "id": "CVE-2023-39999",
  "lastModified": "2024-11-21T08:16:12.447",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "audit@patchstack.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-13T12:15:09.970",
  "references": [
    {
      "source": "audit@patchstack.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
    },
    {
      "source": "audit@patchstack.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/"
    },
    {
      "source": "audit@patchstack.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/"
    },
    {
      "source": "audit@patchstack.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/"
    },
    {
      "source": "audit@patchstack.com",
      "tags": [
        "Exploit",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
    },
    {
      "source": "audit@patchstack.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EVFT4DPZRFTXJPEPADM22BZVIUD2P66/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCCVDPKOK57WCTH2QJ5DJM3B53RJNZKA/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQBL4ZQCBFNQ76XHM5257CIBFQRGT5QY/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve"
    }
  ],
  "sourceIdentifier": "audit@patchstack.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "audit@patchstack.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    }
  ]
}

CERTFR-2024-AVI-0516

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans WordPress. Elles permettent à un attaquant de provoquer une injection de code indirecte à distance (XSS) et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
WordPress WordPress WordPress versions antérieures à 6.5.5
References
Bulletin de sécurité WordPress 2024-06-24 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WordPress versions ant\u00e9rieures \u00e0 6.5.5",
      "product": {
        "name": "WordPress",
        "vendor": {
          "name": "WordPress",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [],
  "links": [],
  "reference": "CERTFR-2024-AVI-0516",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-06-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans WordPress. Elles permettent \u00e0 un attaquant de provoquer une injection de code indirecte \u00e0 distance (XSS) et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans WordPress",
  "vendor_advisories": [
    {
      "published_at": "2024-06-24",
      "title": "Bulletin de s\u00e9curit\u00e9 WordPress",
      "url": "https://wordpress.org/news/2024/06/wordpress-6-5-5/"
    }
  ]
}

CERTFR-2024-AVI-0285

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité a été découverte dans WordPress. Elle permet à un attaquant de provoquer une injection de code indirecte à distance (XSS).

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
WordPress WordPress WordPress versions antérieures à 6.5.2
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WordPress versions ant\u00e9rieures \u00e0 6.5.2",
      "product": {
        "name": "WordPress",
        "vendor": {
          "name": "WordPress",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "links": [],
  "reference": "CERTFR-2024-AVI-0285",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-04-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWordPress\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nune injection de code indirecte \u00e0 distance (XSS).\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans WordPress",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 WordPress du 09 avril 2024",
      "url": "https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/"
    }
  ]
}

CERTFR-2023-AVI-1003

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité a été découverte dans WordPress. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
WordPress WordPress WordPress versions antérieures à 6.4.2
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WordPress versions ant\u00e9rieures \u00e0 6.4.2",
      "product": {
        "name": "WordPress",
        "vendor": {
          "name": "WordPress",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "links": [],
  "reference": "CERTFR-2023-AVI-1003",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-12-07T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans WordPress. Elle permet \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans WordPress",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 WordPress wordpress-6-4-2 du 06 d\u00e9cembre 2023",
      "url": "https://wordpress.org/news/2023/12/wordpress-6-4-2-maintenance-security-release/"
    }
  ]
}