Lucene search

K
cveGitHub_MCVE-2020-4047
HistoryJun 12, 2020 - 4:15 p.m.

CVE-2020-4047

2020-06-1216:15:10
CWE-80
GitHub_M
web.nvd.nist.gov
105
2
wordpress
authenticated users
upload permissions
javascript injection
script execution
security patch
cve-2020-4047
nvd

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

43.4%

In affected versions of WordPress, authenticated users with upload permissions (like authors) are able to inject JavaScript into some media file attachment pages in a certain way. This can lead to script execution in the context of a higher privileged user when the file is viewed by them. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).

Affected configurations

Nvd
Vulners
Node
wordpresswordpressRange3.73.7.34
OR
wordpresswordpressRange3.83.8.34
OR
wordpresswordpressRange3.93.9.32
OR
wordpresswordpressRange4.04.0.31
OR
wordpresswordpressRange4.14.1.31
OR
wordpresswordpressRange4.24.2.28
OR
wordpresswordpressRange4.34.3.24
OR
wordpresswordpressRange4.44.4.23
OR
wordpresswordpressRange4.54.5.22
OR
wordpresswordpressRange4.64.6.19
OR
wordpresswordpressRange4.74.7.18
OR
wordpresswordpressRange4.84.8.14
OR
wordpresswordpressRange4.94.9.15
OR
wordpresswordpressRange5.05.0.10
OR
wordpresswordpressRange5.15.1.6
OR
wordpresswordpressRange5.25.2.7
OR
wordpresswordpressRange5.3.05.3.4
OR
wordpresswordpressRange5.45.4.2
Node
fedoraprojectfedoraMatch32
OR
fedoraprojectfedoraMatch33
Node
debiandebian_linuxMatch8.0
OR
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
VendorProductVersionCPE
wordpresswordpress*cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
fedoraprojectfedora32cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
fedoraprojectfedora33cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
debiandebian_linux8.0cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
debiandebian_linux9.0cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
debiandebian_linux10.0cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "wordpress-develop",
    "vendor": "WordPress",
    "versions": [
      {
        "status": "affected",
        "version": ">= 5.4.0, < 5.4.2"
      },
      {
        "status": "affected",
        "version": ">= 5.3.0, < 5.3.4"
      },
      {
        "status": "affected",
        "version": ">= 5.2.0, < 5.2.7"
      },
      {
        "status": "affected",
        "version": ">= 5.1.0, < 5.1.6"
      },
      {
        "status": "affected",
        "version": ">= 5.0.0, < 5.0.10"
      },
      {
        "status": "affected",
        "version": ">= 4.9.0, < 4.9.15"
      },
      {
        "status": "affected",
        "version": ">= 4.8.0, < 4.8.14"
      },
      {
        "status": "affected",
        "version": ">= 4.7.0, < 4.7.18"
      },
      {
        "status": "affected",
        "version": ">= 4.6.0, < 4.6.19"
      },
      {
        "status": "affected",
        "version": ">= 4.5.0, < 4.5.22"
      },
      {
        "status": "affected",
        "version": ">= 4.4.0, < 4.4.23"
      },
      {
        "status": "affected",
        "version": ">= 4.3.0, < 4.3.24"
      },
      {
        "status": "affected",
        "version": ">= 4.2.0, < 4.2.28"
      },
      {
        "status": "affected",
        "version": ">= 4.1.0, < 4.1.31"
      },
      {
        "status": "affected",
        "version": ">= 4.0.0, < 4.0.31"
      },
      {
        "status": "affected",
        "version": ">= 3.9.0, < 3.9.32"
      },
      {
        "status": "affected",
        "version": ">= 3.8.0, < 3.8.34"
      },
      {
        "status": "affected",
        "version": ">= 3.7.0, < 3.7.34"
      }
    ]
  }
]

Social References

More

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

43.4%