set-screen-option filter misuse by plugins leading to privilege escalation in WordPress
CVE-2020-4050
3.5LOW
Summary
In affected versions of WordPress, misuse of the set-screen-option
filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).
Affected Version(s)
wordpress-develop >= 5.4.0, < 5.4.2 < 5.4.0, 5.4.2
wordpress-develop >= 5.3.0, < 5.3.4 < 5.3.0, 5.3.4
wordpress-develop >= 5.2.0, < 5.2.7 < 5.2.0, 5.2.7
References
CVSS V3.1
Score:
3.5
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved