4.3
CVSSv3

CVE-2021-29450

Published: 15/04/2021 Updated: 23/04/2021
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

Vendor Advisories

Debian Bug report logs - #987065 wordpress: CVE-2021-29450: Authenticated disclosure of password-protected posts and pages Package: src:wordpress; Maintainer for src:wordpress is Craig Small <csmall@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 16 Apr 2021 20:51:01 UTC Severity: grave ...
Several vulnerabilities were discovered in Wordpress, a web blogging tool They allowed remote attackers to perform XML External Entity (XXE) attacks, and access private content For the stable distribution (buster), these problems have been fixed in version 5012+dfsg1-0+deb10u1 We recommend that you upgrade your wordpress packages For the deta ...
One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages This requires at least contributor privileges This has been patched in WordPress 571, along with the older affected versions via minor releases ...