9.8
CVE-2024-31211
- EPSS 44.88%
- Veröffentlicht 04.04.2024 23:15:16
- Zuletzt bearbeitet 02.01.2026 20:12:03
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
WordPress Core 6.4.0 - 6.4.1 - Remote Code Execution POP Chain
WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.
Mögliche Gegenmaßnahme
WordPress: Update to version 6.4.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Core
≫
Produkt
WordPress
Version
6.4.0
Version
6.4.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 44.88% | 0.975 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| security-advisories@github.com | 5.5 | 2.3 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
|
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.