Описание
In affected versions of WordPress, a password reset link emailed to a user does not expire upon changing the user password. Access would be needed to the email account of the user by a malicious party for successful execution. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needed |
devel | needed | |
eoan | ignored | end of life |
esm-apps/bionic | needed | |
esm-apps/focal | needed | |
esm-apps/jammy | needed | |
esm-apps/noble | needed | |
esm-apps/xenial | needed | |
esm-infra-legacy/trusty | DNE | |
focal | ignored | end of standard support, was needed |
Показывать по
EPSS
5.5 Medium
CVSS2
6.1 Medium
CVSS3
Связанные уязвимости
In affected versions of WordPress, a password reset link emailed to a user does not expire upon changing the user password. Access would be needed to the email account of the user by a malicious party for successful execution. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).
In affected versions of WordPress, a password reset link emailed to a ...
Уязвимость функции wp_insert_user и test_wp_update_user_should_delete_userslugs_cache (user.php) системы управления содержимым сайта WordPress, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
EPSS
5.5 Medium
CVSS2
6.1 Medium
CVSS3