In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).
References
Link | Resource |
---|---|
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-vccm-6gmc-qhjh | Third Party Advisory |
https://wordpress.org/support/wordpress-version/version-5-4-1/#security-updates | Release Notes Vendor Advisory |
https://www.debian.org/security/2020/dsa-4677 | Third Party Advisory |
Information
Published : 2020-04-30 16:15
Updated : 2020-08-18 08:05
NVD link : CVE-2020-11030
Mitre link : CVE-2020-11030
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
debian
- debian_linux
wordpress
- wordpress