Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"
WordPress

WordPressсвободно распространяемая система управления содержимым сайта с открытым исходным кодом.

Релизный цикл, информация об уязвимостях

Продукт: WordPress
Вендор: Wordpress

График релизов

6.36.46.56.66.76.82023202420252026

Недавние уязвимости WordPress

Количество 1 894

debian логотип

CVE-2019-20043

больше 5 лет назад

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.ph ...

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2019-20042

больше 5 лет назад

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2019-20042

больше 5 лет назад

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function ...

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2019-20041

больше 5 лет назад

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2019-20041

больше 5 лет назад

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 ...

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2019-20043

больше 5 лет назад

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2019-20042

больше 5 лет назад

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2019-20041

больше 5 лет назад

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2019-16781

больше 5 лет назад

In WordPress before 5.3.1, authenticated users with lower privileges (like contributors) can inject JavaScript code in the block editor, which is executed within the dashboard. It can lead to an admin opening the affected post in the editor leading to XSS.

CVSS3: 5.8
EPSS: Низкий
debian логотип

CVE-2019-16781

больше 5 лет назад

In WordPress before 5.3.1, authenticated users with lower privileges ( ...

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2019-20043

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.ph ...

CVSS3: 4.3
1%
Низкий
больше 5 лет назад
nvd логотип
CVE-2019-20042

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
3%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-20042

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function ...

CVSS3: 6.1
3%
Низкий
больше 5 лет назад
nvd логотип
CVE-2019-20041

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

CVSS3: 9.8
3%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-20041

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 ...

CVSS3: 9.8
3%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2019-20043

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 4.3
1%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2019-20042

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
3%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2019-20041

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

CVSS3: 9.8
3%
Низкий
больше 5 лет назад
nvd логотип
CVE-2019-16781

In WordPress before 5.3.1, authenticated users with lower privileges (like contributors) can inject JavaScript code in the block editor, which is executed within the dashboard. It can lead to an admin opening the affected post in the editor leading to XSS.

CVSS3: 5.8
2%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-16781

In WordPress before 5.3.1, authenticated users with lower privileges ( ...

CVSS3: 5.8
2%
Низкий
больше 5 лет назад

Уязвимостей на страницу


Поделиться