CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
EPSS
Percentile
33.1%
In affected versions of WordPress, a special payload can be crafted that
can lead to scripts getting executed within the search block of the block
editor. This requires an authenticated user with the ability to add
content. This has been patched in version 5.4.1, along with all the
previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5,
5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27,
4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).
github.com/WordPress/wordpress-develop/security/advisories/GHSA-vccm-6gmc-qhjh
launchpad.net/bugs/cve/CVE-2020-11030
nvd.nist.gov/vuln/detail/CVE-2020-11030
security-tracker.debian.org/tracker/CVE-2020-11030
wordpress.org/support/wordpress-version/version-5-4-1/#security-updates
www.cve.org/CVERecord?id=CVE-2020-11030
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
EPSS
Percentile
33.1%