4
CVSSv2

CVE-2021-29450

Published: 15/04/2021 Updated: 23/04/2021
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote malicious users to perform XML External Entity (XXE) attacks, and access private content. For the stable distribution (buster), these problems have been fixed in version 5.0.12+dfsg1-0+deb10u1. We recommend that you upgrade your wordpress packages. For the detailed security status of wordpress please refer to its security tracker page at: security-tracker.debian.org/tracker/wordpress

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

Vendor Advisories

Debian Bug report logs - #987065 wordpress: CVE-2021-29450: Authenticated disclosure of password-protected posts and pages Package: src:wordpress; Maintainer for src:wordpress is Craig Small <csmall@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 16 Apr 2021 20:51:01 UTC Severity: grave ...
Several vulnerabilities were discovered in Wordpress, a web blogging tool They allowed remote attackers to perform XML External Entity (XXE) attacks, and access private content For the stable distribution (buster), these problems have been fixed in version 5012+dfsg1-0+deb10u1 We recommend that you upgrade your wordpress packages For the deta ...
One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages This requires at least contributor privileges This has been patched in WordPress 571, along with the older affected versions via minor releases ...