CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
EPSS
Percentile
48.1%
In WordPress before 5.3.1, authenticated users with lower privileges (like
contributors) can inject JavaScript code in the block editor, which is
executed within the dashboard. It can lead to an admin opening the affected
post in the editor leading to XSS.
github.com/WordPress/wordpress-develop/security/advisories/GHSA-pg4x-64rh-3c9v
hackerone.com/reports/731301
launchpad.net/bugs/cve/CVE-2019-16781
nvd.nist.gov/vuln/detail/CVE-2019-16781
security-tracker.debian.org/tracker/CVE-2019-16781
wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/
wpvulndb.com/vulnerabilities/9976
www.cve.org/CVERecord?id=CVE-2019-16781
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
EPSS
Percentile
48.1%