[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2020-4049Date: (C)2020-06-15   (M)2023-12-22


In affected versions of WordPress, when uploading themes, the name of the theme folder can be crafted in a way that could lead to JavaScript execution in /wp-admin on the themes page. This does require an admin to upload the theme, and is low severity self-XSS. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 2.4CVSS Score : 3.5
Exploit Score: 0.9Exploit Score: 6.8
Impact Score: 1.4Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: MEDIUM
Privileges Required: HIGHAuthentication: SINGLE
User Interaction: REQUIREDConfidentiality: NONE
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: NONEAvailability: NONE
Integrity: LOW 
Availability: NONE 
  
Reference:
DSA-4709
FEDORA-2020-8447a3e195
FEDORA-2020-bbedd29391
https://lists.debian.org/debian-lts-announce/2020/07/msg00000.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00011.html
https://github.com/WordPress/wordpress-develop/commit/404f397b4012fd9d382e55bf7d206c1317f01148
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-87h4-phjv-rm6p
https://wordpress.org/news/2020/06/wordpress-5-4-2-security-and-maintenance-release/

CPE    3
cpe:/o:debian:debian_linux:9.0
cpe:/a:wordpress:wordpress
cpe:/o:debian:debian_linux:8.0
CWE    1
CWE-80
OVAL    4
oval:org.secpod.oval:def:66701
oval:org.secpod.oval:def:118376
oval:org.secpod.oval:def:118374
oval:org.secpod.oval:def:604896
...

© SecPod Technologies