4.3
CVE-2023-39999
- EPSS 0.9%
- Veröffentlicht 13.10.2023 12:15:09
- Zuletzt bearbeitet 21.11.2024 08:16:12
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
WordPress Core <= 6.3.1 - Authenticated(Contributor+) Sensitive Information Exposure via Comments on Protected Posts
Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.
Mögliche Gegenmaßnahme
WordPress: Update to one of the following versions, or a newer patched version: 4.1.39, 4.2.36, 4.3.32, 4.4.31, 4.5.30, 4.6.27, 4.7.27, 4.8.23, 4.9.24, 5.0.20, 5.1.17, 5.2.19, 5.3.16, 5.4.14, 5.5.13, 5.6.12, 5.7.10, 5.8.8, 5.9.8, 6.0.6, 6.1.4, 6.2.3, 6.3.2
Weitere Schwachstelleninformationen
SystemWordPress Core
≫
Produkt
WordPress
Version
* - 4.1.38
Version
4.2 - 4.2.35
Version
4.3 - 4.3.31
Version
4.4 - 4.4.30
Version
4.5 - 4.5.29
Version
4.6 - 4.6.26
Version
4.7 - 4.7.26
Version
4.8 - 4.8.22
Version
4.9 - 4.9.23
Version
5.0 - 5.0.19
Version
5.1 - 5.1.16
Version
5.2 - 5.2.18
Version
5.3 - 5.3.15
Version
5.4 - 5.4.13
Version
5.5 - 5.5.12
Version
5.6 - 5.6.11
Version
5.7 - 5.7.9
Version
5.8 - 5.8.7
Version
5.9 - 5.9.7
Version
6.0 - 6.0.5
Version
6.1 - 6.1.3
Version
6.2 - 6.2.2
Version
6.3 - 6.3.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fedoraproject ≫ Fedora Version37
Fedoraproject ≫ Fedora Version38
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.9% | 0.749 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
|
| audit@patchstack.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.