CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
EPSS
Percentile
70.4%
In affected versions of WordPress, files with a specially crafted name when
uploaded to the Media section can lead to script execution upon accessing
the file. This requires an authenticated user with privileges to upload
files. This has been patched in version 5.4.1, along with all the
previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5,
5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27,
4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).
github.com/WordPress/wordpress-develop/security/advisories/GHSA-3gw2-4656-pfr2
launchpad.net/bugs/cve/CVE-2020-11026
nvd.nist.gov/vuln/detail/CVE-2020-11026
security-tracker.debian.org/tracker/CVE-2020-11026
wordpress.org/support/wordpress-version/version-5-4-1/#security-updates
www.cve.org/CVERecord?id=CVE-2020-11026
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
EPSS
Percentile
70.4%