Debian Wordpress vulnerabilities

360 known vulnerabilities affecting debian/wordpress.

Total CVEs
360
CISA KEV
0
Public exploits
67
Exploited in wild
3
Severity breakdown
CRITICAL21HIGH56MEDIUM201LOW82

Vulnerabilities

Page 3 of 18
CVE-2020-11029MEDIUMCVSS 5.8fixed in wordpress 5.4.1+dfsg1-1 (bookworm)2020
CVE-2020-11029 [MEDIUM] CVE-2020-11029: wordpress - In affected versions of WordPress, a vulnerability in the stats() method of clas... In affected versions of WordPress, a vulnerability in the stats() method of class-wp-object-cache.php can be exploited to execute cross-site scripting (XSS) attacks. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.2
debian
CVE-2020-28034MEDIUMCVSS 6.1fixed in wordpress 5.5.3+dfsg1-1 (bookworm)2020
CVE-2020-28034 [MEDIUM] CVE-2020-28034: wordpress - WordPress before 5.5.2 allows XSS associated with global variables. WordPress before 5.5.2 allows XSS associated with global variables. Scope: local bookworm: resolved (fixed in 5.5.3+dfsg1-1) bullseye: resolved (fixed in 5.5.3+dfsg1-1) forky: resolved (fixed in 5.5.3+dfsg1-1) sid: resolved (fixed in 5.5.3+dfsg1-1) trixie: resolved (fixed in 5.5.3+dfsg1-1)
debian
CVE-2020-11030MEDIUMCVSS 6.4fixed in wordpress 5.4.1+dfsg1-1 (bookworm)2020
CVE-2020-11030 [MEDIUM] CVE-2020-11030: wordpress - In affected versions of WordPress, a special payload can be crafted that can lea... In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9
debian
CVE-2020-11028MEDIUMCVSS 5.8fixed in wordpress 5.4.1+dfsg1-1 (bookworm)2020
CVE-2020-11028 [MEDIUM] CVE-2020-11028: wordpress - In affected versions of WordPress, some private posts, which were previously pub... In affected versions of WordPress, some private posts, which were previously public, can result in unauthenticated disclosure under a specific set of conditions. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4
debian
CVE-2020-11027MEDIUMCVSS 6.1PoCfixed in wordpress 5.4.1+dfsg1-1 (bookworm)2020
CVE-2020-11027 [MEDIUM] CVE-2020-11027: wordpress - In affected versions of WordPress, a password reset link emailed to a user does ... In affected versions of WordPress, a password reset link emailed to a user does not expire upon changing the user password. Access would be needed to the email account of the user by a malicious party for successful execution. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9,
debian
CVE-2020-25286MEDIUMCVSS 5.3fixed in wordpress 5.4.2+dfsg1-1 (bookworm)2020
CVE-2020-25286 [MEDIUM] CVE-2020-25286: wordpress - In wp-includes/comment-template.php in WordPress before 5.4.2, comments from a p... In wp-includes/comment-template.php in WordPress before 5.4.2, comments from a post or page could sometimes be seen in the latest comments even if the post or page was not public. Scope: local bookworm: resolved (fixed in 5.4.2+dfsg1-1) bullseye: resolved (fixed in 5.4.2+dfsg1-1) forky: resolved (fixed in 5.4.2+dfsg1-1) sid: resolved (fixed in 5.4.2+dfsg1-1) tri
debian
CVE-2020-11025MEDIUMCVSS 5.8fixed in wordpress 5.4.1+dfsg1-1 (bookworm)2020
CVE-2020-11025 [MEDIUM] CVE-2020-11025: wordpress - In affected versions of WordPress, a cross-site scripting (XSS) vulnerability in... In affected versions of WordPress, a cross-site scripting (XSS) vulnerability in the navigation section of Customizer allows JavaScript code to be executed. Exploitation requires an authenticated user. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4
debian
CVE-2020-4046MEDIUMCVSS 5.4fixed in wordpress 5.4.2+dfsg1-1 (bookworm)2020
CVE-2020-4046 [MEDIUM] CVE-2020-4046: wordpress - In affected versions of WordPress, users with low privileges (like contributors ... In affected versions of WordPress, users with low privileges (like contributors and authors) can use the embed block in a certain way to inject unfiltered HTML in the block editor. When affected posts are viewed by a higher privileged user, this could lead to script execution in the editor/wp-admin. This has been patched in version 5.4.2, along with all the previo
debian
CVE-2020-4047MEDIUMCVSS 6.8fixed in wordpress 5.4.2+dfsg1-1 (bookworm)2020
CVE-2020-4047 [MEDIUM] CVE-2020-4047: wordpress - In affected versions of WordPress, authenticated users with upload permissions (... In affected versions of WordPress, authenticated users with upload permissions (like authors) are able to inject JavaScript into some media file attachment pages in a certain way. This can lead to script execution in the context of a higher privileged user when the file is viewed by them. This has been patched in version 5.4.2, along with all the previously affect
debian
CVE-2020-4048MEDIUMCVSS 5.7fixed in wordpress 5.4.2+dfsg1-1 (bookworm)2020
CVE-2020-4048 [MEDIUM] CVE-2020-4048: wordpress - In affected versions of WordPress, due to an issue in wp_validate_redirect() and... In affected versions of WordPress, due to an issue in wp_validate_redirect() and URL sanitization, an arbitrary external link can be crafted leading to unintended/open redirect when clicked. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.2
debian
CVE-2020-28040MEDIUMCVSS 4.3fixed in wordpress 5.5.3+dfsg1-1 (bookworm)2020
CVE-2020-28040 [MEDIUM] CVE-2020-28040: wordpress - WordPress before 5.5.2 allows CSRF attacks that change a theme's background imag... WordPress before 5.5.2 allows CSRF attacks that change a theme's background image. Scope: local bookworm: resolved (fixed in 5.5.3+dfsg1-1) bullseye: resolved (fixed in 5.5.3+dfsg1-1) forky: resolved (fixed in 5.5.3+dfsg1-1) sid: resolved (fixed in 5.5.3+dfsg1-1) trixie: resolved (fixed in 5.5.3+dfsg1-1)
debian
CVE-2020-28038MEDIUMCVSS 6.1fixed in wordpress 5.5.3+dfsg1-1 (bookworm)2020
CVE-2020-28038 [MEDIUM] CVE-2020-28038: wordpress - WordPress before 5.5.2 allows stored XSS via post slugs. WordPress before 5.5.2 allows stored XSS via post slugs. Scope: local bookworm: resolved (fixed in 5.5.3+dfsg1-1) bullseye: resolved (fixed in 5.5.3+dfsg1-1) forky: resolved (fixed in 5.5.3+dfsg1-1) sid: resolved (fixed in 5.5.3+dfsg1-1) trixie: resolved (fixed in 5.5.3+dfsg1-1)
debian
CVE-2020-4050LOWCVSS 3.5fixed in wordpress 5.4.2+dfsg1-1 (bookworm)2020
CVE-2020-4050 [LOW] CVE-2020-4050: wordpress - In affected versions of WordPress, misuse of the `set-screen-option` filter's re... In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a m
debian
CVE-2020-4049LOWCVSS 2.4fixed in wordpress 5.4.2+dfsg1-1 (bookworm)2020
CVE-2020-4049 [LOW] CVE-2020-4049: wordpress - In affected versions of WordPress, when uploading themes, the name of the theme ... In affected versions of WordPress, when uploading themes, the name of the theme folder can be crafted in a way that could lead to JavaScript execution in /wp-admin on the themes page. This does require an admin to upload the theme, and is low severity self-XSS. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release
debian
CVE-2019-20041CRITICALCVSS 9.8fixed in wordpress 5.3.2+dfsg1-1 (bookworm)2019
CVE-2019-20041 [CRITICAL] CVE-2019-20041: wordpress - wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandle... wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring. Scope: local bookworm: resolved (fixed in 5.3.2+dfsg1-1) bullseye: resolved (fixed in 5.3.2+dfsg1-1) forky: resolved (fixed in 5.3.2+dfsg1-1) sid: resolved
debian
CVE-2019-17669CRITICALCVSS 9.8fixed in wordpress 5.2.4+dfsg1-1 (bookworm)2019
CVE-2019-17669 [CRITICAL] CVE-2019-17669: wordpress - WordPress before 5.2.4 has a Server Side Request Forgery (SSRF) vulnerability be... WordPress before 5.2.4 has a Server Side Request Forgery (SSRF) vulnerability because URL validation does not consider the interpretation of a name as a series of hex characters. Scope: local bookworm: resolved (fixed in 5.2.4+dfsg1-1) bullseye: resolved (fixed in 5.2.4+dfsg1-1) forky: resolved (fixed in 5.2.4+dfsg1-1) sid: resolved (fixed in 5.2.4+dfsg1-1) tr
debian
CVE-2019-17670CRITICALCVSS 9.8fixed in wordpress 5.2.4+dfsg1-1 (bookworm)2019
CVE-2019-17670 [CRITICAL] CVE-2019-17670: wordpress - WordPress before 5.2.4 has a Server Side Request Forgery (SSRF) vulnerability be... WordPress before 5.2.4 has a Server Side Request Forgery (SSRF) vulnerability because Windows paths are mishandled during certain validation of relative URLs. Scope: local bookworm: resolved (fixed in 5.2.4+dfsg1-1) bullseye: resolved (fixed in 5.2.4+dfsg1-1) forky: resolved (fixed in 5.2.4+dfsg1-1) sid: resolved (fixed in 5.2.4+dfsg1-1) trixie: resolved (fixe
debian
CVE-2019-17675HIGHCVSS 8.8fixed in wordpress 5.2.4+dfsg1-1 (bookworm)2019
CVE-2019-17675 [HIGH] CVE-2019-17675: wordpress - WordPress before 5.2.4 does not properly consider type confusion during validati... WordPress before 5.2.4 does not properly consider type confusion during validation of the referer in the admin pages, possibly leading to CSRF. Scope: local bookworm: resolved (fixed in 5.2.4+dfsg1-1) bullseye: resolved (fixed in 5.2.4+dfsg1-1) forky: resolved (fixed in 5.2.4+dfsg1-1) sid: resolved (fixed in 5.2.4+dfsg1-1) trixie: resolved (fixed in 5.2.4+dfsg1-1)
debian
CVE-2019-8942HIGHCVSS 8.8ExploitedPoCfixed in wordpress 5.0.1+dfsg1-1 (bookworm)2019
CVE-2019-8942 [HIGH] CVE-2019-8942: wordpress - WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because... WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage C
debian
CVE-2019-9787HIGHCVSS 8.8fixed in wordpress 5.1.1+dfsg1-1 (bookworm)2019
CVE-2019-9787 [HIGH] CVE-2019-9787: wordpress - WordPress before 5.1.1 does not properly filter comment content, leading to Remo... WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. The XSS results in administrative access, which allows arbitrary change
debian