Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"
WordPress

WordPressсвободно распространяемая система управления содержимым сайта с открытым исходным кодом.

Релизный цикл, информация об уязвимостях

Продукт: WordPress
Вендор: Wordpress

График релизов

6.36.46.56.66.76.82023202420252026

Недавние уязвимости WordPress

Количество 1 894

nvd логотип

CVE-2019-16780

больше 5 лет назад

WordPress users with lower privileges (like contributors) can inject JavaScript code in the block editor using a specific payload, which is executed within the dashboard. This can lead to XSS if an admin opens the post in the editor. Execution of this attack does require an authenticated user. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. Automatic updates are enabled by default for minor releases and we strongly recommend that you keep them enabled.

CVSS3: 5.8
EPSS: Низкий
debian логотип

CVE-2019-16780

больше 5 лет назад

WordPress users with lower privileges (like contributors) can inject J ...

CVSS3: 5.8
EPSS: Низкий
ubuntu логотип

CVE-2019-16781

больше 5 лет назад

In WordPress before 5.3.1, authenticated users with lower privileges (like contributors) can inject JavaScript code in the block editor, which is executed within the dashboard. It can lead to an admin opening the affected post in the editor leading to XSS.

CVSS3: 5.8
EPSS: Низкий
ubuntu логотип

CVE-2019-16780

больше 5 лет назад

WordPress users with lower privileges (like contributors) can inject JavaScript code in the block editor using a specific payload, which is executed within the dashboard. This can lead to XSS if an admin opens the post in the editor. Execution of this attack does require an authenticated user. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. Automatic updates are enabled by default for minor releases and we strongly recommend that you keep them enabled.

CVSS3: 5.8
EPSS: Низкий
nvd логотип

CVE-2019-17675

почти 6 лет назад

WordPress before 5.2.4 does not properly consider type confusion during validation of the referer in the admin pages, possibly leading to CSRF.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2019-17675

почти 6 лет назад

WordPress before 5.2.4 does not properly consider type confusion durin ...

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2019-17674

почти 6 лет назад

WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripting) via the Customizer.

CVSS3: 5.4
EPSS: Низкий
debian логотип

CVE-2019-17674

почти 6 лет назад

WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripti ...

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2019-17673

почти 6 лет назад

WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON GET requests because certain requests lack a Vary: Origin header.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-17673

почти 6 лет назад

WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON ...

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2019-16780

WordPress users with lower privileges (like contributors) can inject JavaScript code in the block editor using a specific payload, which is executed within the dashboard. This can lead to XSS if an admin opens the post in the editor. Execution of this attack does require an authenticated user. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. Automatic updates are enabled by default for minor releases and we strongly recommend that you keep them enabled.

CVSS3: 5.8
2%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-16780

WordPress users with lower privileges (like contributors) can inject J ...

CVSS3: 5.8
2%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2019-16781

In WordPress before 5.3.1, authenticated users with lower privileges (like contributors) can inject JavaScript code in the block editor, which is executed within the dashboard. It can lead to an admin opening the affected post in the editor leading to XSS.

CVSS3: 5.8
2%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2019-16780

WordPress users with lower privileges (like contributors) can inject JavaScript code in the block editor using a specific payload, which is executed within the dashboard. This can lead to XSS if an admin opens the post in the editor. Execution of this attack does require an authenticated user. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. Automatic updates are enabled by default for minor releases and we strongly recommend that you keep them enabled.

CVSS3: 5.8
2%
Низкий
больше 5 лет назад
nvd логотип
CVE-2019-17675

WordPress before 5.2.4 does not properly consider type confusion during validation of the referer in the admin pages, possibly leading to CSRF.

CVSS3: 8.8
4%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-17675

WordPress before 5.2.4 does not properly consider type confusion durin ...

CVSS3: 8.8
4%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-17674

WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripting) via the Customizer.

CVSS3: 5.4
2%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-17674

WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripti ...

CVSS3: 5.4
2%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-17673

WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON GET requests because certain requests lack a Vary: Origin header.

CVSS3: 7.5
4%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-17673

WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON ...

CVSS3: 7.5
4%
Низкий
почти 6 лет назад

Уязвимостей на страницу


Поделиться