CVE-2019-20042

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.
References
Link Resource
https://blog.ripstech.com/filter/vulnerabilities/ Not Applicable
https://core.trac.wordpress.org/changeset/46894/trunk Patch
https://github.com/WordPress/wordpress-develop/commit/1f7f3f1f59567e2504f0fbebd51ccf004b3ccb1d Patch
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-xvg2-m2f4-83m7 Third Party Advisory
https://hackerone.com/reports/509930 Third Party Advisory
https://seclists.org/bugtraq/2020/Jan/8 Mailing List Third Party Advisory
https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/ Release Notes Vendor Advisory
https://wpvulndb.com/vulnerabilities/9975 Release Notes Third Party Advisory
https://www.debian.org/security/2020/dsa-4599 Third Party Advisory
https://www.debian.org/security/2020/dsa-4677 Third Party Advisory
https://blog.ripstech.com/filter/vulnerabilities/ Not Applicable
https://core.trac.wordpress.org/changeset/46894/trunk Patch
https://github.com/WordPress/wordpress-develop/commit/1f7f3f1f59567e2504f0fbebd51ccf004b3ccb1d Patch
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-xvg2-m2f4-83m7 Third Party Advisory
https://hackerone.com/reports/509930 Third Party Advisory
https://seclists.org/bugtraq/2020/Jan/8 Mailing List Third Party Advisory
https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/ Release Notes Vendor Advisory
https://wpvulndb.com/vulnerabilities/9975 Release Notes Third Party Advisory
https://www.debian.org/security/2020/dsa-4599 Third Party Advisory
https://www.debian.org/security/2020/dsa-4677 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:37

Type Values Removed Values Added
References () https://blog.ripstech.com/filter/vulnerabilities/ - Not Applicable () https://blog.ripstech.com/filter/vulnerabilities/ - Not Applicable
References () https://core.trac.wordpress.org/changeset/46894/trunk - Patch () https://core.trac.wordpress.org/changeset/46894/trunk - Patch
References () https://github.com/WordPress/wordpress-develop/commit/1f7f3f1f59567e2504f0fbebd51ccf004b3ccb1d - Patch () https://github.com/WordPress/wordpress-develop/commit/1f7f3f1f59567e2504f0fbebd51ccf004b3ccb1d - Patch
References () https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-xvg2-m2f4-83m7 - Third Party Advisory () https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-xvg2-m2f4-83m7 - Third Party Advisory
References () https://hackerone.com/reports/509930 - Third Party Advisory () https://hackerone.com/reports/509930 - Third Party Advisory
References () https://seclists.org/bugtraq/2020/Jan/8 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2020/Jan/8 - Mailing List, Third Party Advisory
References () https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/ - Release Notes, Vendor Advisory () https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/ - Release Notes, Vendor Advisory
References () https://wpvulndb.com/vulnerabilities/9975 - Release Notes, Third Party Advisory () https://wpvulndb.com/vulnerabilities/9975 - Release Notes, Third Party Advisory
References () https://www.debian.org/security/2020/dsa-4599 - Third Party Advisory () https://www.debian.org/security/2020/dsa-4599 - Third Party Advisory
References () https://www.debian.org/security/2020/dsa-4677 - Third Party Advisory () https://www.debian.org/security/2020/dsa-4677 - Third Party Advisory

Information

Published : 2019-12-27 08:15

Updated : 2024-11-21 04:37


NVD link : CVE-2019-20042

Mitre link : CVE-2019-20042

CVE.ORG link : CVE-2019-20042


JSON object : View

Products Affected

debian

  • debian_linux

wordpress

  • wordpress
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')