CVE-2019-20042
WordPress Core < 5.3.1 - Authenticated Stored Cross-Site Scripting
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.
En wp-includes / formatting.php en WordPress 3.7 a 5.3.0, la función wp_targeted_link_rel () se puede usar de una manera particular para generar una vulnerabilidad de scripting entre sitios (XSS) almacenada. Esto se ha solucionado en WordPress 5.3.1, junto con todas las versiones anteriores de WordPress desde 3.7 a 5.3 a través de una versión menor.
Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform various Cross-Side Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create files on the server, disclose private information, create open redirects, poison cache, and bypass authorization access and input sanitation.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-12-13 CVE Published
- 2019-12-27 CVE Reserved
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
https://blog.ripstech.com/filter/vulnerabilities | Not Applicable | |
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-xvg2-m2f4-83m7 | Third Party Advisory | |
https://hackerone.com/reports/509930 | Third Party Advisory | |
https://seclists.org/bugtraq/2020/Jan/8 | Mailing List |
|
https://wpvulndb.com/vulnerabilities/9975 | Release Notes |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://core.trac.wordpress.org/changeset/46894/trunk | 2023-01-19 | |
https://github.com/WordPress/wordpress-develop/commit/1f7f3f1f59567e2504f0fbebd51ccf004b3ccb1d | 2023-01-19 |
URL | Date | SRC |
---|---|---|
https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release | 2023-01-19 | |
https://www.debian.org/security/2020/dsa-4599 | 2023-01-19 | |
https://www.debian.org/security/2020/dsa-4677 | 2023-01-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wordpress Search vendor "Wordpress" | Wordpress Search vendor "Wordpress" for product "Wordpress" | >= 3.7 < 5.3.1 Search vendor "Wordpress" for product "Wordpress" and version " >= 3.7 < 5.3.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|