3.5
CVSSv2

CVE-2021-39201

Published: 09/09/2021 Updated: 14/12/2021
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.4 | Impact Score: 2.7 | Exploitability Score: 2.3
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. ### Impact The issue allows an authenticated but low-privileged user (like contributor/author) to execute XSS in the editor. This bypasses the restrictions imposed on users who do not have the permission to post `unfiltered_html`. ### Patches This has been patched in WordPress 5.8, and will be pushed to older versions via minor releases (automatic updates). It's strongly recommended that you keep auto-updates enabled to receive the fix. ### References wordpress.org/news/category/releases/ hackerone.com/reports/1142140 ### For more information If you have any questions or comments about this advisory: * Open an issue in [HackerOne](hackerone.com/wordpress)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wordpress wordpress

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Debian Bug report logs - #994060 wordpress: CVE-2021-39200 Package: src:wordpress; Maintainer for src:wordpress is Craig Small <csmall@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 10 Sep 2021 19:27:04 UTC Severity: important Tags: security, upstream Found in version wordpress/571+d ...
Debian Bug report logs - #994059 wordpress: CVE-2021-39201 Package: src:wordpress; Maintainer for src:wordpress is Craig Small <csmall@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 10 Sep 2021 19:27:01 UTC Severity: important Tags: security, upstream Found in versions wordpress/5012 ...
Several vulnerabilities were discovered in Wordpress, a web blogging tool They allowed remote attackers to perform Cross-Site Scripting (XSS) attacks or impersonate other users For the oldstable distribution (buster), these problems have been fixed in version 5014+dfsg1-0+deb10u1 For the stable distribution (bullseye), these problems have been ...