CVE-2020-28036
- EPSS 4.8%
- Veröffentlicht 02.11.2020 21:15:30
- Zuletzt bearbeitet 21.11.2024 05:22:15
wp-includes/class-wp-xmlrpc-server.php in WordPress before 5.5.2 allows attackers to gain privileges by using XML-RPC to comment on a post.
CVE-2020-28037
- EPSS 12.73%
- Veröffentlicht 02.11.2020 21:15:30
- Zuletzt bearbeitet 21.11.2024 05:22:15
is_blog_installed in wp-includes/functions.php in WordPress before 5.5.2 improperly determines whether WordPress is already installed, which might allow an attacker to perform a new installation, leading to remote code execution (as well as a denial ...
CVE-2020-25286
- EPSS 0.58%
- Veröffentlicht 13.09.2020 18:15:10
- Zuletzt bearbeitet 21.11.2024 05:17:52
In wp-includes/comment-template.php in WordPress before 5.4.2, comments from a post or page could sometimes be seen in the latest comments even if the post or page was not public.
CVE-2020-4046
- EPSS 6.85%
- Veröffentlicht 12.06.2020 16:15:10
- Zuletzt bearbeitet 21.11.2024 05:32:12
In affected versions of WordPress, users with low privileges (like contributors and authors) can use the embed block in a certain way to inject unfiltered HTML in the block editor. When affected posts are viewed by a higher privileged user, this coul...
CVE-2020-4047
- EPSS 5.57%
- Veröffentlicht 12.06.2020 16:15:10
- Zuletzt bearbeitet 21.11.2024 05:32:13
In affected versions of WordPress, authenticated users with upload permissions (like authors) are able to inject JavaScript into some media file attachment pages in a certain way. This can lead to script execution in the context of a higher privilege...
CVE-2020-4048
- EPSS 3.5%
- Veröffentlicht 12.06.2020 16:15:10
- Zuletzt bearbeitet 21.11.2024 05:32:13
In affected versions of WordPress, due to an issue in wp_validate_redirect() and URL sanitization, an arbitrary external link can be crafted leading to unintended/open redirect when clicked. This has been patched in version 5.4.2, along with all the ...
CVE-2020-4049
- EPSS 5.89%
- Veröffentlicht 12.06.2020 16:15:10
- Zuletzt bearbeitet 21.11.2024 05:32:13
In affected versions of WordPress, when uploading themes, the name of the theme folder can be crafted in a way that could lead to JavaScript execution in /wp-admin on the themes page. This does require an admin to upload the theme, and is low severit...
- EPSS 2.42%
- Veröffentlicht 12.06.2020 16:15:10
- Zuletzt bearbeitet 21.11.2024 05:32:13
In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged b...
CVE-2020-11026
- EPSS 4.41%
- Veröffentlicht 30.04.2020 23:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:37
In affected versions of WordPress, files with a specially crafted name when uploaded to the Media section can lead to script execution upon accessing the file. This requires an authenticated user with privileges to upload files. This has been patched...
CVE-2020-11027
- EPSS 42.55%
- Veröffentlicht 30.04.2020 23:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:37
In affected versions of WordPress, a password reset link emailed to a user does not expire upon changing the user password. Access would be needed to the email account of the user by a malicious party for successful execution. This has been patched i...