Product:

Wordpress

(Wordpress)
Date Id Summary Products Score Patch Annotated
2022-12-05 CVE-2022-43504 Improper authentication vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to obtain the email address of the user who posted a blog using the WordPress Post by Email Feature. The developer also provides new patched releases for all versions since 3.7. Wordpress 5.3
2019-09-11 CVE-2019-16217 WordPress before 5.2.3 allows XSS in media uploads because wp_ajax_upload_attachment is mishandled. Debian_linux, Wordpress 6.1
2019-09-11 CVE-2019-16218 WordPress before 5.2.3 allows XSS in stored comments. Debian_linux, Wordpress 6.1
2019-09-11 CVE-2019-16219 WordPress before 5.2.3 allows XSS in shortcode previews. Debian_linux, Wordpress 6.1
2019-09-11 CVE-2019-16220 In WordPress before 5.2.3, validation and sanitization of a URL in wp_validate_redirect in wp-includes/pluggable.php could lead to an open redirect. Debian_linux, Wordpress 6.1
2019-09-11 CVE-2019-16221 WordPress before 5.2.3 allows reflected XSS in the dashboard. Debian_linux, Wordpress 6.1
2019-09-11 CVE-2019-16222 WordPress before 5.2.3 has an issue with URL sanitization in wp_kses_bad_protocol_once in wp-includes/kses.php that can lead to cross-site scripting (XSS) attacks. Debian_linux, Wordpress 6.1
2019-12-27 CVE-2019-20043 In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. Debian_linux, Wordpress 4.3
2019-12-26 CVE-2019-16781 In WordPress before 5.3.1, authenticated users with lower privileges (like contributors) can inject JavaScript code in the block editor, which is executed within the dashboard. It can lead to an admin opening the affected post in the editor leading to XSS. Debian_linux, Wordpress 5.4
2019-12-27 CVE-2019-20042 In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. Debian_linux, Wordpress 6.1