CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
EPSS
Percentile
51.5%
In affected versions of WordPress, a cross-site scripting (XSS)
vulnerability in the navigation section of Customizer allows JavaScript
code to be executed. Exploitation requires an authenticated user. This has
been patched in version 5.4.1, along with all the previously affected
versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13,
4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31,
3.8.33, 3.7.33).
github.com/WordPress/wordpress-develop/security/advisories/GHSA-4mhg-j6fx-5g3c
launchpad.net/bugs/cve/CVE-2020-11025
nvd.nist.gov/vuln/detail/CVE-2020-11025
security-tracker.debian.org/tracker/CVE-2020-11025
wordpress.org/support/wordpress-version/version-5-4-1/#security-updates
www.cve.org/CVERecord?id=CVE-2020-11025
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
EPSS
Percentile
51.5%