In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.
References
Link | Resource |
---|---|
https://blog.ripstech.com/filter/vulnerabilities/ | Not Applicable |
https://core.trac.wordpress.org/changeset/46894/trunk | Patch |
https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/ | Release Notes Vendor Advisory |
https://github.com/WordPress/wordpress-develop/commit/1f7f3f1f59567e2504f0fbebd51ccf004b3ccb1d | Patch |
https://wpvulndb.com/vulnerabilities/9975 | Release Notes Third Party Advisory |
https://www.debian.org/security/2020/dsa-4599 | Third Party Advisory |
https://seclists.org/bugtraq/2020/Jan/8 | Mailing List Third Party Advisory |
https://hackerone.com/reports/509930 | Third Party Advisory |
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-xvg2-m2f4-83m7 | Third Party Advisory |
https://www.debian.org/security/2020/dsa-4677 | Third Party Advisory |
Information
Published : 2019-12-27 00:15
Updated : 2023-01-18 19:13
NVD link : CVE-2019-20042
Mitre link : CVE-2019-20042
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
debian
- debian_linux
wordpress
- wordpress