9.8

CVE-2024-31211

WordPress Core 6.4.0 - 6.4.1 - Remote Code Execution POP Chain

WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.
Mögliche Gegenmaßnahme
WordPress: Update to version 6.4.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Core
Produkt WordPress
Version 6.4.0
Version 6.4.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
WordpressWordpress Version >= 6.4.0 < 6.4.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 44.88% 0.975
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
security-advisories@github.com 5.5 2.3 2.7
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
CWE-502 Deserialization of Untrusted Data

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.