Lucene search

K
nvd[email protected]NVD:CVE-2020-11026
HistoryApr 30, 2020 - 11:15 p.m.

CVE-2020-11026

2020-04-3023:15:11
CWE-707
CWE-79
web.nvd.nist.gov
5

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

8.4

Confidence

High

EPSS

0.003

Percentile

70.4%

In affected versions of WordPress, files with a specially crafted name when uploaded to the Media section can lead to script execution upon accessing the file. This requires an authenticated user with privileges to upload files. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).

Affected configurations

Nvd
Node
wordpresswordpressRange3.73.7.33
OR
wordpresswordpressRange3.83.8.33
OR
wordpresswordpressRange3.93.9.31
OR
wordpresswordpressRange4.04.0.30
OR
wordpresswordpressRange4.14.1.30
OR
wordpresswordpressRange4.24.2.27
OR
wordpresswordpressRange4.34.3.23
OR
wordpresswordpressRange4.44.4.22
OR
wordpresswordpressRange4.54.5.21
OR
wordpresswordpressRange4.64.6.18
OR
wordpresswordpressRange4.74.7.17
OR
wordpresswordpressRange4.84.8.13
OR
wordpresswordpressRange4.94.9.14
OR
wordpresswordpressRange5.05.0.9
OR
wordpresswordpressRange5.15.1.5
OR
wordpresswordpressRange5.25.2.6
OR
wordpresswordpressRange5.35.3.3
OR
wordpresswordpressMatch5.4
Node
debiandebian_linuxMatch8.0
OR
debiandebian_linuxMatch9.0
OR
debiandebian_linuxMatch10.0
VendorProductVersionCPE
wordpresswordpress*cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
wordpresswordpress5.4cpe:2.3:a:wordpress:wordpress:5.4:*:*:*:*:*:*:*
debiandebian_linux8.0cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
debiandebian_linux9.0cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
debiandebian_linux10.0cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

8.4

Confidence

High

EPSS

0.003

Percentile

70.4%