Логотип exploitDog
product: "wordpress"
Консоль
Логотип exploitDog

exploitDog

product: "wordpress"

Количество 1 894

Количество 1 894

ubuntu логотип

CVE-2020-11025

больше 5 лет назад

In affected versions of WordPress, a cross-site scripting (XSS) vulnerability in the navigation section of Customizer allows JavaScript code to be executed. Exploitation requires an authenticated user. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).

CVSS3: 5.8
EPSS: Низкий
nvd логотип

CVE-2020-11025

больше 5 лет назад

In affected versions of WordPress, a cross-site scripting (XSS) vulnerability in the navigation section of Customizer allows JavaScript code to be executed. Exploitation requires an authenticated user. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).

CVSS3: 5.8
EPSS: Низкий
debian логотип

CVE-2020-11025

больше 5 лет назад

In affected versions of WordPress, a cross-site scripting (XSS) vulner ...

CVSS3: 5.8
EPSS: Низкий
ubuntu логотип

CVE-2019-9787

больше 6 лет назад

WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. The XSS results in administrative access, which allows arbitrary changes to .php files. This is related to wp-admin/includes/ajax-actions.php and wp-includes/comment.php.

CVSS3: 8.8
EPSS: Высокий
nvd логотип

CVE-2019-9787

больше 6 лет назад

WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. The XSS results in administrative access, which allows arbitrary changes to .php files. This is related to wp-admin/includes/ajax-actions.php and wp-includes/comment.php.

CVSS3: 8.8
EPSS: Высокий
debian логотип

CVE-2019-9787

больше 6 лет назад

WordPress before 5.1.1 does not properly filter comment content, leadi ...

CVSS3: 8.8
EPSS: Высокий
ubuntu логотип

CVE-2019-8943

больше 6 лет назад

WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.

CVSS3: 6.5
EPSS: Критический
nvd логотип

CVE-2019-8943

больше 6 лет назад

WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.

CVSS3: 6.5
EPSS: Критический
debian логотип

CVE-2019-8943

больше 6 лет назад

WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An a ...

CVSS3: 6.5
EPSS: Критический
ubuntu логотип

CVE-2019-8942

больше 6 лет назад

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.

CVSS3: 8.8
EPSS: Критический
nvd логотип

CVE-2019-8942

больше 6 лет назад

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.

CVSS3: 8.8
EPSS: Критический
debian логотип

CVE-2019-8942

больше 6 лет назад

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code executi ...

CVSS3: 8.8
EPSS: Критический
ubuntu логотип

CVE-2019-20043

больше 5 лет назад

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2019-20043

больше 5 лет назад

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2019-20043

больше 5 лет назад

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.ph ...

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2019-20042

больше 5 лет назад

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2019-20042

больше 5 лет назад

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2019-20042

больше 5 лет назад

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function ...

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2019-20041

больше 5 лет назад

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2019-20041

больше 5 лет назад

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-11025

In affected versions of WordPress, a cross-site scripting (XSS) vulnerability in the navigation section of Customizer allows JavaScript code to be executed. Exploitation requires an authenticated user. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).

CVSS3: 5.8
1%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-11025

In affected versions of WordPress, a cross-site scripting (XSS) vulnerability in the navigation section of Customizer allows JavaScript code to be executed. Exploitation requires an authenticated user. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).

CVSS3: 5.8
1%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-11025

In affected versions of WordPress, a cross-site scripting (XSS) vulner ...

CVSS3: 5.8
1%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2019-9787

WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. The XSS results in administrative access, which allows arbitrary changes to .php files. This is related to wp-admin/includes/ajax-actions.php and wp-includes/comment.php.

CVSS3: 8.8
86%
Высокий
больше 6 лет назад
nvd логотип
CVE-2019-9787

WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. The XSS results in administrative access, which allows arbitrary changes to .php files. This is related to wp-admin/includes/ajax-actions.php and wp-includes/comment.php.

CVSS3: 8.8
86%
Высокий
больше 6 лет назад
debian логотип
CVE-2019-9787

WordPress before 5.1.1 does not properly filter comment content, leadi ...

CVSS3: 8.8
86%
Высокий
больше 6 лет назад
ubuntu логотип
CVE-2019-8943

WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.

CVSS3: 6.5
94%
Критический
больше 6 лет назад
nvd логотип
CVE-2019-8943

WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.

CVSS3: 6.5
94%
Критический
больше 6 лет назад
debian логотип
CVE-2019-8943

WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An a ...

CVSS3: 6.5
94%
Критический
больше 6 лет назад
ubuntu логотип
CVE-2019-8942

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.

CVSS3: 8.8
92%
Критический
больше 6 лет назад
nvd логотип
CVE-2019-8942

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.

CVSS3: 8.8
92%
Критический
больше 6 лет назад
debian логотип
CVE-2019-8942

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code executi ...

CVSS3: 8.8
92%
Критический
больше 6 лет назад
ubuntu логотип
CVE-2019-20043

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 4.3
1%
Низкий
больше 5 лет назад
nvd логотип
CVE-2019-20043

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 4.3
1%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-20043

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.ph ...

CVSS3: 4.3
1%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2019-20042

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
3%
Низкий
больше 5 лет назад
nvd логотип
CVE-2019-20042

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
3%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-20042

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function ...

CVSS3: 6.1
3%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2019-20041

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

CVSS3: 9.8
3%
Низкий
больше 5 лет назад
nvd логотип
CVE-2019-20041

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

CVSS3: 9.8
3%
Низкий
больше 5 лет назад

Уязвимостей на страницу