Authenticated XSS through embed block in WordPress
CVE-2020-4046

5.4MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
12 June 2020

Summary

In affected versions of WordPress, users with low privileges (like contributors and authors) can use the embed block in a certain way to inject unfiltered HTML in the block editor. When affected posts are viewed by a higher privileged user, this could lead to script execution in the editor/wp-admin. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).

Affected Version(s)

wordpress-develop >= 5.4.0, < 5.4.2 < 5.4.0, 5.4.2

wordpress-develop >= 5.3.0, < 5.3.4 < 5.3.0, 5.3.4

wordpress-develop >= 5.2.0, < 5.2.7 < 5.2.0, 5.2.7

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.