Lucene search

K
cveGitHub_MCVE-2020-11027
HistoryApr 30, 2020 - 11:15 p.m.

CVE-2020-11027

2020-04-3023:15:11
CWE-672
CWE-640
GitHub_M
web.nvd.nist.gov
175
2
wordpress
password reset
vulnerability
cve-2020-11027
nvd
security fix

CVSS2

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

7.8

Confidence

High

EPSS

0.008

Percentile

81.7%

In affected versions of WordPress, a password reset link emailed to a user does not expire upon changing the user password. Access would be needed to the email account of the user by a malicious party for successful execution. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).

Affected configurations

Nvd
Vulners
Node
debiandebian_linuxMatch8.0
OR
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
Node
wordpresswordpressRange3.73.7.33
OR
wordpresswordpressRange3.83.8.33
OR
wordpresswordpressRange3.93.9.31
OR
wordpresswordpressRange4.04.0.30
OR
wordpresswordpressRange4.14.1.30
OR
wordpresswordpressRange4.24.2.27
OR
wordpresswordpressRange4.34.3.23
OR
wordpresswordpressRange4.44.4.22
OR
wordpresswordpressRange4.54.5.21
OR
wordpresswordpressRange4.64.6.18
OR
wordpresswordpressRange4.74.7.17
OR
wordpresswordpressRange4.84.8.13
OR
wordpresswordpressRange4.94.9.14
OR
wordpresswordpressRange5.05.0.9
OR
wordpresswordpressRange5.15.1.5
OR
wordpresswordpressRange5.25.2.6
OR
wordpresswordpressRange5.35.3.3
OR
wordpresswordpressMatch5.4
VendorProductVersionCPE
debiandebian_linux8.0cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
debiandebian_linux9.0cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
debiandebian_linux10.0cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
wordpresswordpress*cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
wordpresswordpress5.4cpe:2.3:a:wordpress:wordpress:5.4:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "WordPress",
    "product": "WordPress",
    "versions": [
      {
        "version": ">= 5.4.0, < 5.4.1",
        "status": "affected"
      },
      {
        "version": ">= 5.3.0, < 5.3.3",
        "status": "affected"
      },
      {
        "version": ">= 5.2.0, < 5.2.6",
        "status": "affected"
      },
      {
        "version": ">= 5.1.0, < 5.1.5",
        "status": "affected"
      },
      {
        "version": ">= 5.0.0, < 5.0.9",
        "status": "affected"
      },
      {
        "version": ">= 4.9.0, < 4.9.14",
        "status": "affected"
      },
      {
        "version": ">= 4.8.0, < 4.8.13",
        "status": "affected"
      },
      {
        "version": ">= 4.7.0, < 4.7.17",
        "status": "affected"
      },
      {
        "version": ">= 4.6.0, < 4.6.18",
        "status": "affected"
      },
      {
        "version": ">= 4.5.0, < 4.5.21",
        "status": "affected"
      },
      {
        "version": ">= 4.4.0, < 4.4.22",
        "status": "affected"
      },
      {
        "version": ">= 4.3.0, < 4.3.23",
        "status": "affected"
      },
      {
        "version": ">= 4.2.0, < 4.2.27",
        "status": "affected"
      },
      {
        "version": ">= 4.1.0, < 4.1.30",
        "status": "affected"
      },
      {
        "version": ">= 4.0.0, < 4.0.30",
        "status": "affected"
      },
      {
        "version": ">= 3.9.0, < 3.9.31",
        "status": "affected"
      },
      {
        "version": ">= 3.8.0, < 3.8.33",
        "status": "affected"
      },
      {
        "version": ">= 3.7.0, < 3.7.33",
        "status": "affected"
      }
    ]
  }
]

Social References

More

CVSS2

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

7.8

Confidence

High

EPSS

0.008

Percentile

81.7%