Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-11026
HistoryApr 30, 2020 - 10:15 p.m.

CVE-2020-11026 Specially crafted filenames in WordPress leading to XSS

2020-04-3022:15:32
CWE-707
GitHub_M
www.cve.org
7

CVSS3

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

AI Score

8

Confidence

High

EPSS

0.003

Percentile

70.4%

In affected versions of WordPress, files with a specially crafted name when uploaded to the Media section can lead to script execution upon accessing the file. This requires an authenticated user with privileges to upload files. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).

CNA Affected

[
  {
    "product": "WordPress",
    "vendor": "WordPress",
    "versions": [
      {
        "status": "affected",
        "version": ">= 5.4.0, < 5.4.1"
      },
      {
        "status": "affected",
        "version": ">= 5.3.0, < 5.3.3"
      },
      {
        "status": "affected",
        "version": ">= 5.2.0, < 5.2.6"
      },
      {
        "status": "affected",
        "version": ">= 5.1.0, < 5.1.5"
      },
      {
        "status": "affected",
        "version": ">= 5.0.0, < 5.0.9"
      },
      {
        "status": "affected",
        "version": ">= 4.9.0, < 4.9.14"
      },
      {
        "status": "affected",
        "version": ">= 4.8.0, < 4.8.13"
      },
      {
        "status": "affected",
        "version": ">= 4.7.0, < 4.7.17"
      },
      {
        "status": "affected",
        "version": ">= 4.6.0, < 4.6.18"
      },
      {
        "status": "affected",
        "version": ">= 4.5.0, < 4.5.21"
      },
      {
        "status": "affected",
        "version": ">= 4.4.0, < 4.4.22"
      },
      {
        "status": "affected",
        "version": ">= 4.3.0, < 4.3.23"
      },
      {
        "status": "affected",
        "version": ">= 4.2.0, < 4.2.27"
      },
      {
        "status": "affected",
        "version": ">= 4.1.0, < 4.1.30"
      },
      {
        "status": "affected",
        "version": ">= 4.0.0, < 4.0.30"
      },
      {
        "status": "affected",
        "version": ">= 3.9.0, < 3.9.31"
      },
      {
        "status": "affected",
        "version": ">= 3.8.0, < 3.8.33"
      },
      {
        "status": "affected",
        "version": ">= 3.7.0, < 3.7.33"
      }
    ]
  }
]

CVSS3

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

AI Score

8

Confidence

High

EPSS

0.003

Percentile

70.4%