Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-4973

Опубликовано: 16 окт. 2024
Источник: debian
EPSS Низкий

Описание

WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed6.0.2+dfsg1-1package
wordpressfixed5.7.8+dfsg1-0+deb11u1bullseyepackage
wordpressfixed5.0.17+dfsg1-0+deb10u1busterpackage

Примечания

  • https://core.trac.wordpress.org/changeset/53961 (branches/6.0)

  • https://core.trac.wordpress.org/changeset/53973 (branches/5.0)

  • https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/

EPSS

Процентиль: 52%
0.00295
Низкий

Связанные уязвимости

CVSS3: 4.9
ubuntu
11 месяцев назад

WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.

CVSS3: 4.9
nvd
11 месяцев назад

WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.

CVSS3: 4.9
github
11 месяцев назад

WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.

EPSS

Процентиль: 52%
0.00295
Низкий