WordPress — свободно распространяемая система управления содержимым сайта с открытым исходным кодом.
Релизный цикл, информация об уязвимостях
График релизов
Количество 1 894

CVE-2023-38000
Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions.
CVE-2023-38000
Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability i ...

CVE-2023-38000
Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions.

BDU:2023-08227
Уязвимость реализации прикладного программного интерфейса системы управления содержимым сайта WordPress, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

BDU:2023-06642
Уязвимость плагина Contact Form Generator, предназначенного для создания контактных форм на сайтах WordPress, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)
GHSA-xgqr-2mpj-w9qv
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.

CVE-2023-2745
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
CVE-2023-2745
WordPress Core is vulnerable to Directory Traversal in versions up to, ...

CVE-2023-2745
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.

BDU:2023-06645
Уязвимость плагина Better Font Awesome системы управления содержимым сайта WordPress, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
---|---|---|---|---|
![]() | CVE-2023-38000 Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions. | CVSS3: 6.5 | 0% Низкий | больше 1 года назад |
CVE-2023-38000 Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability i ... | CVSS3: 6.5 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2023-38000 Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions. | CVSS3: 6.5 | 0% Низкий | больше 1 года назад |
![]() | BDU:2023-08227 Уязвимость реализации прикладного программного интерфейса системы управления содержимым сайта WordPress, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 5.3 | 64% Средний | больше 1 года назад |
![]() | BDU:2023-06642 Уязвимость плагина Contact Form Generator, предназначенного для создания контактных форм на сайтах WordPress, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS) | CVSS3: 6.1 | 1% Низкий | больше 1 года назад |
GHSA-xgqr-2mpj-w9qv WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack. | CVSS3: 5.4 | 71% Высокий | почти 2 года назад | |
![]() | CVE-2023-2745 WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack. | CVSS3: 5.4 | 71% Высокий | около 2 лет назад |
CVE-2023-2745 WordPress Core is vulnerable to Directory Traversal in versions up to, ... | CVSS3: 5.4 | 71% Высокий | около 2 лет назад | |
![]() | CVE-2023-2745 WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack. | CVSS3: 5.4 | 71% Высокий | около 2 лет назад |
![]() | BDU:2023-06645 Уязвимость плагина Better Font Awesome системы управления содержимым сайта WordPress, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS) | CVSS3: 5.4 | 0% Низкий | больше 2 лет назад |
Уязвимостей на страницу