set-screen-option filter misuse by plugins leading to privilege escalation in WordPress
CVE-2020-4050

3.5LOW

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
12 June 2020

Summary

In affected versions of WordPress, misuse of the set-screen-option filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).

Affected Version(s)

wordpress-develop >= 5.4.0, < 5.4.2 < 5.4.0, 5.4.2

wordpress-develop >= 5.3.0, < 5.3.4 < 5.3.0, 5.3.4

wordpress-develop >= 5.2.0, < 5.2.7 < 5.2.0, 5.2.7

References

CVSS V3.1

Score:
3.5
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.