CVE-2020-11025
Description
In affected versions of WordPress, a cross-site scripting (XSS) vulnerability in the navigation section of Customizer allows JavaScript code to be executed. Exploitation requires an authenticated user. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).
CWE
- CWE-79 — CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected
- WordPress / WordPress — v=>= 5.4.0, < 5.4.1 [affected]; v=>= 5.3.0, < 5.3.3 [affected]; v=>= 5.2.0, < 5.2.6 [affected]; v=>= 5.1.0, < 5.1.5 [affected]; v=>= 5.0.0, < 5.0.9 [affected]; v=>= 4.9.0, < 4.9.14 [affected]; v=>= 4.8.0, < 4.8.13 [affected]; v=>= 4.7.0, < 4.7.17 [affected]; v=>= 4.6.0, < 4.6.18 [affected]; v=>= 4.5.0, < 4.5.21 [affected]; v=>= 4.4.0, < 4.4.22 [affected]; v=>= 4.3.0, < 4.3.23 [affected]; v=>= 4.2.0, < 4.2.27 [affected]; v=>= 4.1.0, < 4.1.30 [affected]; v=>= 4.0.0, < 4.0.30 [affected]; v=>= 3.9.0, < 3.9.31 [affected]; v=>= 3.8.0, < 3.8.33 [affected]; v=>= 3.7.0, < 3.7.33 [affected]
CVSS
- 3.1 score=5.8 severity=MEDIUM
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
References
- https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-4mhg-j6fx-5g3c x_refsource_CONFIRM
- https://wordpress.org/support/wordpress-version/version-5-4-1/#security-updates x_refsource_MISC
- https://www.debian.org/security/2020/dsa-4677 vendor-advisory, x_refsource_DEBIAN
Source
cvelistV5-main/cves/2020/11xxx/CVE-2020-11025.json