Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-4439

Опубликовано: 03 мая 2024
Источник: ubuntu
Приоритет: medium
EPSS Критический
CVSS3: 7.2

Описание

WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.

РелизСтатусПримечание
devel

not-affected

6.7.2+dfsg1-1.1ubuntu1
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

mantic

ignored

end of life, was needs-triage
noble

needs-triage

Показывать по

EPSS

Процентиль: 100%
0.9083
Критический

7.2 High

CVSS3

Связанные уязвимости

CVSS3: 7.2
nvd
около 1 года назад

WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.

CVSS3: 7.2
debian
около 1 года назад

WordPress Core is vulnerable to Stored Cross-Site Scripting via user d ...

CVSS3: 7.2
github
около 1 года назад

WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.

CVSS3: 7.2
fstec
около 1 года назад

Уязвимость модуля «Avatar» («Аватар») системы управления содержимым сайта WordPress, позволяющая нарушителю получить доступ на чтение, изменение или удаление данных и провести атаку межсайтового скриптинга (XSS)

EPSS

Процентиль: 100%
0.9083
Критический

7.2 High

CVSS3