CVE-2019-20043 — Improper Privilege Management in Wordpress
Severity
4.3MEDIUMNVD
EPSS
1.2%
top 21.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 27
Latest updateMay 24
Description
In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4
Affected Packages3 packages
Also affects: Debian Linux 10.0, 9.0
Patches
🔴Vulnerability Details
2📋Vendor Advisories
1Debian▶
CVE-2019-20043: wordpress - In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordP...↗2019
💬Community
3Bugzilla▶
CVE-2019-20043 wordpress: authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API↗2020-01-21
Bugzilla▶
CVE-2019-20043 wordpress: authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API [epel-7]↗2020-01-21
Bugzilla▶
CVE-2019-20043 wordpress: authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API [epel-6]↗2020-01-21