CVE-2020-11028
- EPSS 0.84%
- Veröffentlicht 30.04.2020 23:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:37
In affected versions of WordPress, some private posts, which were previously public, can result in unauthenticated disclosure under a specific set of conditions. This has been patched in version 5.4.1, along with all the previously affected versions ...
CVE-2020-11029
- EPSS 2.65%
- Veröffentlicht 30.04.2020 23:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:37
In affected versions of WordPress, a vulnerability in the stats() method of class-wp-object-cache.php can be exploited to execute cross-site scripting (XSS) attacks. This has been patched in version 5.4.1, along with all the previously affected versi...
CVE-2020-11030
- EPSS 1.04%
- Veröffentlicht 30.04.2020 23:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:37
In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in v...
CVE-2020-11025
- EPSS 1.43%
- Veröffentlicht 30.04.2020 22:15:11
- Zuletzt bearbeitet 21.11.2024 04:56:36
In affected versions of WordPress, a cross-site scripting (XSS) vulnerability in the navigation section of Customizer allows JavaScript code to be executed. Exploitation requires an authenticated user. This has been patched in version 5.4.1, along wi...
CVE-2019-20041
- EPSS 0.93%
- Veröffentlicht 27.12.2019 08:15:09
- Zuletzt bearbeitet 21.11.2024 04:37:56
wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.
CVE-2019-20042
- EPSS 5.05%
- Veröffentlicht 27.12.2019 08:15:09
- Zuletzt bearbeitet 21.11.2024 04:37:56
In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the ...
- EPSS 1.17%
- Veröffentlicht 27.12.2019 08:15:09
- Zuletzt bearbeitet 21.11.2024 04:37:56
In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contri...
CVE-2019-16780
- EPSS 3.61%
- Veröffentlicht 26.12.2019 17:15:13
- Zuletzt bearbeitet 21.11.2024 04:31:10
WordPress users with lower privileges (like contributors) can inject JavaScript code in the block editor using a specific payload, which is executed within the dashboard. This can lead to XSS if an admin opens the post in the editor. Execution of thi...
CVE-2019-16781
- EPSS 3.11%
- Veröffentlicht 26.12.2019 17:15:13
- Zuletzt bearbeitet 21.11.2024 04:31:10
In WordPress before 5.3.1, authenticated users with lower privileges (like contributors) can inject JavaScript code in the block editor, which is executed within the dashboard. It can lead to an admin opening the affected post in the editor leading t...
CVE-2019-17672
- EPSS 6.27%
- Veröffentlicht 17.10.2019 13:15:11
- Zuletzt bearbeitet 21.11.2024 04:32:45
WordPress before 5.2.4 is vulnerable to a stored XSS attack to inject JavaScript into STYLE elements.