In affected versions of WordPress, users with low privileges (like contributors and authors) can use the embed block in a certain way to inject unfiltered HTML in the block editor. When affected posts are viewed by a higher privileged user, this could lead to script execution in the editor/wp-admin. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 05:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-rpwf-hrh2-39jf - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/07/msg00000.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/773N2ZV7QEMBGKH6FBKI6Q5S3YJMW357/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ODNHXVJS25YVWYQHOCICXTLIN5UYJFDN/ - | |
References | () https://wordpress.org/news/2020/06/wordpress-5-4-2-security-and-maintenance-release/ - Vendor Advisory | |
References | () https://www.debian.org/security/2020/dsa-4709 - Third Party Advisory |
07 Nov 2023, 03:23
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-06-12 16:15
Updated : 2024-11-21 05:32
NVD link : CVE-2020-4046
Mitre link : CVE-2020-4046
CVE.ORG link : CVE-2020-4046
JSON object : View
Products Affected
fedoraproject
- fedora
debian
- debian_linux
wordpress
- wordpress