CVE-2020-4046Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Wordpress

Severity
5.4MEDIUMNVD
EPSS
6.9%
top 8.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 12
Latest updateJun 18

Description

In affected versions of WordPress, users with low privileges (like contributors and authors) can use the embed block in a certain way to inject unfiltered HTML in the block editor. When affected posts are viewed by a higher privileged user, this could lead to script execution in the editor/wp-admin. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.2

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages4 packages

debiandebian/wordpress< wordpress 5.4.2+dfsg1-1 (bookworm)
NVDwordpress/wordpress3.73.7.34+17
Debianwordpress/wordpress< 5.4.2+dfsg1-1+3
CVEListV5wordpress/wordpress-develop18 versions+17

Also affects: Debian Linux 8.0, 9.0, Fedora 31, 32

🔴Vulnerability Details

1
OSV
CVE-2020-4046: In affected versions of WordPress, users with low privileges (like contributors and authors) can use the embed block in a certain way to inject unfilt2020-06-12

📋Vendor Advisories

1
Debian
CVE-2020-4046: wordpress - In affected versions of WordPress, users with low privileges (like contributors ...2020

💬Community

3
Bugzilla
CVE-2020-4046 wordpress: authenticated XSS through embed block [epel-all]2020-06-18
Bugzilla
CVE-2020-4046 wordpress: authenticated XSS through embed block2020-06-18
Bugzilla
CVE-2020-4046 wordpress: authenticated XSS through embed block [fedora-all]2020-06-18