Lucene search

K
cveGitHub_MCVE-2020-4050
HistoryJun 12, 2020 - 4:15 p.m.

CVE-2020-4050

2020-06-1216:15:10
CWE-288
GitHub_M
web.nvd.nist.gov
154
2
wordpress
cve-2020-4050
security vulnerability
version 5.4.2
nvd
set-screen-option filter
admin privilege
user meta fields

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

3.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N

AI Score

5

Confidence

High

EPSS

0.001

Percentile

41.7%

In affected versions of WordPress, misuse of the set-screen-option filter’s return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).

Affected configurations

Nvd
Vulners
Node
wordpresswordpressRange3.73.7.34
OR
wordpresswordpressRange3.83.8.34
OR
wordpresswordpressRange3.93.9.32
OR
wordpresswordpressRange4.04.0.31
OR
wordpresswordpressRange4.14.1.31
OR
wordpresswordpressRange4.24.2.28
OR
wordpresswordpressRange4.34.3.24
OR
wordpresswordpressRange4.44.4.23
OR
wordpresswordpressRange4.54.5.22
OR
wordpresswordpressRange4.64.6.19
OR
wordpresswordpressRange4.74.7.18
OR
wordpresswordpressRange4.84.8.14
OR
wordpresswordpressRange4.94.9.15
OR
wordpresswordpressRange5.05.0.10
OR
wordpresswordpressRange5.15.1.6
OR
wordpresswordpressRange5.25.2.7
OR
wordpresswordpressRange5.3.05.3.4
OR
wordpresswordpressRange5.45.4.2
Node
fedoraprojectfedoraMatch31
OR
fedoraprojectfedoraMatch32
Node
debiandebian_linuxMatch8.0
OR
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
VendorProductVersionCPE
wordpresswordpress*cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
fedoraprojectfedora31cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
fedoraprojectfedora32cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
debiandebian_linux8.0cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
debiandebian_linux9.0cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
debiandebian_linux10.0cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "wordpress-develop",
    "vendor": "WordPress",
    "versions": [
      {
        "status": "affected",
        "version": ">= 5.4.0, < 5.4.2"
      },
      {
        "status": "affected",
        "version": ">= 5.3.0, < 5.3.4"
      },
      {
        "status": "affected",
        "version": ">= 5.2.0, < 5.2.7"
      },
      {
        "status": "affected",
        "version": ">= 5.1.0, < 5.1.6"
      },
      {
        "status": "affected",
        "version": ">= 5.0.0, < 5.0.10"
      },
      {
        "status": "affected",
        "version": ">= 4.9.0, < 4.9.15"
      },
      {
        "status": "affected",
        "version": ">= 4.8.0, < 4.8.14"
      },
      {
        "status": "affected",
        "version": ">= 4.7.0, < 4.7.18"
      },
      {
        "status": "affected",
        "version": ">= 4.6.0, < 4.6.19"
      },
      {
        "status": "affected",
        "version": ">= 4.5.0, < 4.5.22"
      },
      {
        "status": "affected",
        "version": ">= 4.4.0, < 4.4.23"
      },
      {
        "status": "affected",
        "version": ">= 4.3.0, < 4.3.24"
      },
      {
        "status": "affected",
        "version": ">= 4.2.0, < 4.2.28"
      },
      {
        "status": "affected",
        "version": ">= 4.1.0, < 4.1.31"
      },
      {
        "status": "affected",
        "version": ">= 4.0.0, < 4.0.31"
      },
      {
        "status": "affected",
        "version": ">= 3.9.0, < 3.9.32"
      },
      {
        "status": "affected",
        "version": ">= 3.8.0, < 3.8.34"
      },
      {
        "status": "affected",
        "version": ">= 3.7.0, < 3.7.34"
      }
    ]
  }
]

Social References

More

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

3.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N

AI Score

5

Confidence

High

EPSS

0.001

Percentile

41.7%