CVE-2021-39203

WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions authenticated users who don't have permission to view private post types/data can bypass restrictions in the block editor under certain conditions. This affected WordPress 5.8 beta during the testing period. It's fixed in the final 5.8 release.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wordpress:wordpress:5.8:beta1:*:*:*:*:*:*

History

21 Nov 2024, 06:18

Type Values Removed Values Added
References () https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-qxvw-qxm9-qvg6 - Third Party Advisory () https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-qxvw-qxm9-qvg6 - Third Party Advisory
References () https://hackerone.com/reports/1225282 - Permissions Required () https://hackerone.com/reports/1225282 - Permissions Required
CVSS v2 : 6.0
v3 : 6.5
v2 : 6.0
v3 : 6.8

Information

Published : 2021-09-09 22:15

Updated : 2024-11-21 06:18


NVD link : CVE-2021-39203

Mitre link : CVE-2021-39203

CVE.ORG link : CVE-2021-39203


JSON object : View

Products Affected

wordpress

  • wordpress
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo