set-screen-option filter misuse by plugins leading to privilege escalation in WordPress
CVE-2020-4050
3.5LOW
Summary
In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).
Affected Version(s)
wordpress-develop < 5.4.0, 5.4.2
wordpress-develop < 5.3.0, 5.3.4
wordpress-develop < 5.2.0, 5.2.7
CVSS V3.1
Score:
3.5
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Risk change from: 3.1 to: 3.5 - (LOW)
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database