Lucene search

K

WordPress Security Vulnerabilities

cve
cve

CVE-2019-17670

WordPress before 5.2.4 has a Server Side Request Forgery (SSRF) vulnerability because Windows paths are mishandled during certain validation of relative URLs.

9.8CVSS

9.3AI Score

0.007EPSS

2019-10-17 01:15 PM
222
4
cve
cve

CVE-2019-17671

In WordPress before 5.2.4, unauthenticated viewing of certain content is possible because the static query property is mishandled.

5.3CVSS

7AI Score

0.016EPSS

2019-10-17 01:15 PM
204
2
cve
cve

CVE-2019-17672

WordPress before 5.2.4 is vulnerable to a stored XSS attack to inject JavaScript into STYLE elements.

6.1CVSS

7.1AI Score

0.012EPSS

2019-10-17 01:15 PM
155
cve
cve

CVE-2019-17673

WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON GET requests because certain requests lack a Vary: Origin header.

7.5CVSS

8.3AI Score

0.004EPSS

2019-10-17 01:15 PM
154
2
cve
cve

CVE-2019-17674

WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripting) via the Customizer.

5.4CVSS

6.8AI Score

0.002EPSS

2019-10-17 01:15 PM
171
cve
cve

CVE-2019-17675

WordPress before 5.2.4 does not properly consider type confusion during validation of the referer in the admin pages, possibly leading to CSRF.

8.8CVSS

9AI Score

0.002EPSS

2019-10-17 01:15 PM
356
2
cve
cve

CVE-2019-20041

wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.

9.8CVSS

9.2AI Score

0.009EPSS

2019-12-27 08:15 AM
238
3
cve
cve

CVE-2019-20042

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a...

6.1CVSS

6.7AI Score

0.002EPSS

2019-12-27 08:15 AM
116
cve
cve

CVE-2019-20043

In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this al...

4.3CVSS

6.2AI Score

0.003EPSS

2019-12-27 08:15 AM
109
2
cve
cve

CVE-2019-8942

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image ...

8.8CVSS

7.8AI Score

0.956EPSS

2019-02-20 03:29 AM
260
cve
cve

CVE-2019-8943

WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substrin...

6.5CVSS

6.4AI Score

0.949EPSS

2019-02-20 03:29 AM
206
3
cve
cve

CVE-2019-9787

WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. Th...

8.8CVSS

8.5AI Score

0.755EPSS

2019-03-14 04:29 PM
196
cve
cve

CVE-2020-11025

In affected versions of WordPress, a cross-site scripting (XSS) vulnerability in the navigation section of Customizer allows JavaScript code to be executed. Exploitation requires an authenticated user. This has been patched in version 5.4.1, along with all the previously affected versions via a min...

5.8CVSS

5.1AI Score

0.002EPSS

2020-04-30 10:15 PM
391
2
cve
cve

CVE-2020-11026

In affected versions of WordPress, files with a specially crafted name when uploaded to the Media section can lead to script execution upon accessing the file. This requires an authenticated user with privileges to upload files. This has been patched in version 5.4.1, along with all the previously ...

8.7CVSS

5.8AI Score

0.003EPSS

2020-04-30 11:15 PM
145
2
cve
cve

CVE-2020-11027

In affected versions of WordPress, a password reset link emailed to a user does not expire upon changing the user password. Access would be needed to the email account of the user by a malicious party for successful execution. This has been patched in version 5.4.1, along with all the previously af...

8.1CVSS

7.8AI Score

0.008EPSS

2020-04-30 11:15 PM
164
2
cve
cve

CVE-2020-11028

In affected versions of WordPress, some private posts, which were previously public, can result in unauthenticated disclosure under a specific set of conditions. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, ...

7.5CVSS

7.5AI Score

0.003EPSS

2020-04-30 11:15 PM
165
2
cve
cve

CVE-2020-11029

In affected versions of WordPress, a vulnerability in the stats() method of class-wp-object-cache.php can be exploited to execute cross-site scripting (XSS) attacks. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0...

6.1CVSS

6.2AI Score

0.009EPSS

2020-04-30 11:15 PM
210
2
cve
cve

CVE-2020-11030

In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in version 5.4.1, along with all the previously affec...

6.4CVSS

5.3AI Score

0.001EPSS

2020-04-30 11:15 PM
129
cve
cve

CVE-2020-25286

In wp-includes/comment-template.php in WordPress before 5.4.2, comments from a post or page could sometimes be seen in the latest comments even if the post or page was not public.

5.3CVSS

5.5AI Score

0.001EPSS

2020-09-13 06:15 PM
118
2
cve
cve

CVE-2020-28032

WordPress before 5.5.2 mishandles deserialization requests in wp-includes/Requests/Utility/FilteredIterator.php.

9.8CVSS

9.3AI Score

0.007EPSS

2020-11-02 09:15 PM
169
4
cve
cve

CVE-2020-28033

WordPress before 5.5.2 mishandles embeds from disabled sites on a multisite network, as demonstrated by allowing a spam embed.

7.5CVSS

8.3AI Score

0.003EPSS

2020-11-02 09:15 PM
97
4
cve
cve

CVE-2020-28034

WordPress before 5.5.2 allows XSS associated with global variables.

6.1CVSS

7.2AI Score

0.026EPSS

2020-11-02 09:15 PM
126
4
cve
cve

CVE-2020-28035

WordPress before 5.5.2 allows attackers to gain privileges via XML-RPC.

9.8CVSS

9.3AI Score

0.003EPSS

2020-11-02 09:15 PM
176
cve
cve

CVE-2020-28036

wp-includes/class-wp-xmlrpc-server.php in WordPress before 5.5.2 allows attackers to gain privileges by using XML-RPC to comment on a post.

9.8CVSS

9.3AI Score

0.007EPSS

2020-11-02 09:15 PM
143
cve
cve

CVE-2020-28037

is_blog_installed in wp-includes/functions.php in WordPress before 5.5.2 improperly determines whether WordPress is already installed, which might allow an attacker to perform a new installation, leading to remote code execution (as well as a denial of service for the old installation).

9.8CVSS

9.4AI Score

0.024EPSS

2020-11-02 09:15 PM
127
cve
cve

CVE-2020-28038

WordPress before 5.5.2 allows stored XSS via post slugs.

6.1CVSS

7.1AI Score

0.025EPSS

2020-11-02 09:15 PM
106
4
cve
cve

CVE-2020-28039

is_protected_meta in wp-includes/meta.php in WordPress before 5.5.2 allows arbitrary file deletion because it does not properly determine whether a meta key is considered protected.

9.1CVSS

9.2AI Score

0.003EPSS

2020-11-02 09:15 PM
125
2
cve
cve

CVE-2020-28040

WordPress before 5.5.2 allows CSRF attacks that change a theme's background image.

4.3CVSS

6.4AI Score

0.004EPSS

2020-11-02 09:15 PM
89
4
cve
cve

CVE-2020-36326

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in saf...

9.8CVSS

8.7AI Score

0.007EPSS

2021-04-28 03:15 AM
459
18
cve
cve

CVE-2020-4046

In affected versions of WordPress, users with low privileges (like contributors and authors) can use the embed block in a certain way to inject unfiltered HTML in the block editor. When affected posts are viewed by a higher privileged user, this could lead to script execution in the editor/wp-admin...

5.4CVSS

5.2AI Score

0.004EPSS

2020-06-12 04:15 PM
99
2
cve
cve

CVE-2020-4047

In affected versions of WordPress, authenticated users with upload permissions (like authors) are able to inject JavaScript into some media file attachment pages in a certain way. This can lead to script execution in the context of a higher privileged user when the file is viewed by them. This has ...

6.8CVSS

6.4AI Score

0.001EPSS

2020-06-12 04:15 PM
97
2
cve
cve

CVE-2020-4048

In affected versions of WordPress, due to an issue in wp_validate_redirect() and URL sanitization, an arbitrary external link can be crafted leading to unintended/open redirect when clicked. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release ...

5.7CVSS

5.9AI Score

0.001EPSS

2020-06-12 04:15 PM
169
2
cve
cve

CVE-2020-4049

In affected versions of WordPress, when uploading themes, the name of the theme folder can be crafted in a way that could lead to JavaScript execution in /wp-admin on the themes page. This does require an admin to upload the theme, and is low severity self-XSS. This has been patched in version 5.4....

2.4CVSS

4.9AI Score

0.001EPSS

2020-06-12 04:15 PM
107
3
cve
cve

CVE-2020-4050

In affected versions of WordPress, misuse of the set-screen-option filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in ve...

3.5CVSS

5AI Score

0.001EPSS

2020-06-12 04:15 PM
144
2
cve
cve

CVE-2021-24227

The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and...

7.5CVSS

7.4AI Score

0.022EPSS

2021-04-12 02:15 PM
25
cve
cve

CVE-2021-24228

The Jetpack Scan team identified a Reflected Cross-Site Scripting in the Login Form of the Patreon WordPress plugin before 1.7.2. The WordPress login form (wp-login.php) is hooked by the plugin and offers to allow users to authenticate on the site using their Patreon account. Unfortunately, some of...

9.6CVSS

8.5AI Score

0.002EPSS

2021-04-12 02:15 PM
16
cve
cve

CVE-2021-24229

The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is ac...

9.6CVSS

8.5AI Score

0.002EPSS

2021-04-12 02:15 PM
19
cve
cve

CVE-2021-24230

The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the...

8.1CVSS

8AI Score

0.001EPSS

2021-04-12 02:15 PM
18
cve
cve

CVE-2021-24231

The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged administrator disconnect the site from Patreon by visiting a specially crafted link.

6.5CVSS

6.3AI Score

0.001EPSS

2021-04-12 02:15 PM
21
cve
cve

CVE-2021-24343

The iFlyChat WordPress plugin before 4.7.0 does not sanitise its APP ID setting before outputting it back in the page, leading to an authenticated Stored Cross-Site Scripting issue

4.8CVSS

4.9AI Score

0.001EPSS

2021-06-07 11:15 AM
31
cve
cve

CVE-2021-24372

The WP Hardening – Fix Your WordPress Security WordPress plugin before 1.2.2 did not sanitise or escape the $_SERVER['REQUEST_URI'] before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue.

6.1CVSS

6AI Score

0.001EPSS

2021-06-21 08:15 PM
37
2
cve
cve

CVE-2021-24373

The WP Hardening – Fix Your WordPress Security WordPress plugin before 1.2.2 did not sanitise or escape the historyvalue GET parameter before outputting it in a Javascript block, leading to a reflected Cross-Site Scripting issue.

6.1CVSS

6AI Score

0.001EPSS

2021-06-21 08:15 PM
34
cve
cve

CVE-2021-24380

The Shantz WordPress QOTD WordPress plugin through 1.2.2 is lacking any CSRF check when updating its settings, allowing attackers to make logged in administrators change them to arbitrary values.

4.3CVSS

4.7AI Score

0.001EPSS

2021-08-16 11:15 AM
25
cve
cve

CVE-2021-24392

An id GET parameter of the WordPress Membership SwiftCloud.io WordPress plugin through 1.0 is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.

7.2CVSS

7.3AI Score

0.001EPSS

2021-09-06 11:15 AM
27
cve
cve

CVE-2021-24396

A pageid GET parameter of the GSEOR – WordPress SEO Plugin WordPress plugin through 1.3 is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.

7.2CVSS

7.2AI Score

0.001EPSS

2021-09-20 10:15 AM
31
cve
cve

CVE-2021-24402

The Orders functionality in the WP iCommerce WordPress plugin through 1.1.1 has an order_id parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors

7.2CVSS

7.2AI Score

0.001EPSS

2021-09-20 10:15 AM
18
cve
cve

CVE-2021-24403

The Orders functionality in the WordPress Page Contact plugin through 1.0 has an order_id parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors

7.2CVSS

7.2AI Score

0.001EPSS

2021-09-20 10:15 AM
19
cve
cve

CVE-2021-24423

The UpdraftPlus WordPress Backup Plugin WordPress plugin before 1.6.59 does not sanitise its updraft_service settings, allowing high privilege users to set malicious JavaScript payload in it and leading to a Stored Cross-Site Scripting issue

4.8CVSS

4.7AI Score

0.001EPSS

2022-01-24 08:15 AM
22
cve
cve

CVE-2021-24544

The Responsive WordPress Slider WordPress plugin through 2.2.0 does not sanitise and escape some of the Slider options, allowing Cross-Site Scripting payloads to be set in them. Furthermore, as by default any authenticated user is allowed to create Sliders (https://wordpress.org/support/topic/slide...

5.4CVSS

5.4AI Score

0.001EPSS

2021-10-25 02:15 PM
22
cve
cve

CVE-2021-24640

The WordPress Slider Block Gutenslider plugin before 5.2.0 does not escape the minWidth attribute of a Gutenburg block, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks

5.4CVSS

5.3AI Score

0.001EPSS

2021-09-20 10:15 AM
23
Total number of security vulnerabilities514