Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"
WordPress

WordPressсвободно распространяемая система управления содержимым сайта с открытым исходным кодом.

Релизный цикл, информация об уязвимостях

Продукт: WordPress
Вендор: Wordpress

График релизов

6.36.46.56.66.76.82023202420252026

Недавние уязвимости WordPress

Количество 1 896

github логотип

GHSA-7w4p-72j7-v7c2

больше 5 лет назад

Phar object injection in PHPMailer

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2019-20043

почти 6 лет назад

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2019-20043

почти 6 лет назад

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.ph ...

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2019-20042

почти 6 лет назад

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2019-20042

почти 6 лет назад

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function ...

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2019-20041

почти 6 лет назад

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2019-20041

почти 6 лет назад

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 ...

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2019-20041

почти 6 лет назад

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2019-20043

почти 6 лет назад

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2019-20042

почти 6 лет назад

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-7w4p-72j7-v7c2

Phar object injection in PHPMailer

CVSS3: 8.8
1%
Низкий
больше 5 лет назад
nvd логотип
CVE-2019-20043

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 4.3
1%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-20043

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.ph ...

CVSS3: 4.3
1%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-20042

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
5%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-20042

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function ...

CVSS3: 6.1
5%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-20041

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

CVSS3: 9.8
1%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-20041

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 ...

CVSS3: 9.8
1%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2019-20041

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

CVSS3: 9.8
1%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2019-20043

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 4.3
1%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2019-20042

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
5%
Низкий
почти 6 лет назад

Уязвимостей на страницу


Поделиться