CVE-2020-11029
Description
In affected versions of WordPress, a vulnerability in the stats() method of class-wp-object-cache.php can be exploited to execute cross-site scripting (XSS) attacks. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).
CWE
- CWE-79 — CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected
- WordPress / WordPress — v=>= 5.4.0, < 5.4.1 [affected]; v=>= 5.3.0, < 5.3.3 [affected]; v=>= 5.2.0, < 5.2.6 [affected]; v=>= 5.1.0, < 5.1.5 [affected]; v=>= 5.0.0, < 5.0.9 [affected]; v=>= 4.9.0, < 4.9.14 [affected]; v=>= 4.8.0, < 4.8.13 [affected]; v=>= 4.7.0, < 4.7.17 [affected]; v=>= 4.6.0, < 4.6.18 [affected]; v=>= 4.5.0, < 4.5.21 [affected]; v=>= 4.4.0, < 4.4.22 [affected]; v=>= 4.3.0, < 4.3.23 [affected]; v=>= 4.2.0, < 4.2.27 [affected]; v=>= 4.1.0, < 4.1.30 [affected]; v=>= 4.0.0, < 4.0.30 [affected]; v=>= 3.9.0, < 3.9.31 [affected]; v=>= 3.8.0, < 3.8.33 [affected]; v=>= 3.7.0, < 3.7.33 [affected]
CVSS
- 3.1 score=5.8 severity=MEDIUM
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
References
- https://wordpress.org/support/wordpress-version/version-5-4-1/#security-updates x_refsource_MISC
- https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-568w-8m88-8g2c x_refsource_CONFIRM
- https://www.debian.org/security/2020/dsa-4677 vendor-advisory, x_refsource_DEBIAN
- https://lists.debian.org/debian-lts-announce/2020/05/msg00011.html mailing-list, x_refsource_MLIST
Source
cvelistV5-main/cves/2020/11xxx/CVE-2020-11029.json