BIT-wordpress-multisite-2021-39201

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/wordpress-multisite/BIT-wordpress-multisite-2021-39201.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-wordpress-multisite-2021-39201
Aliases
Published
2024-03-06T11:10:19.185Z
Modified
2024-11-27T19:40:48.342Z
Summary
[none]
Details

WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. ### Impact The issue allows an authenticated but low-privileged user (like contributor/author) to execute XSS in the editor. This bypasses the restrictions imposed on users who do not have the permission to post unfiltered_html. ### Patches This has been patched in WordPress 5.8, and will be pushed to older versions via minor releases (automatic updates). It's strongly recommended that you keep auto-updates enabled to receive the fix. ### References https://wordpress.org/news/category/releases/ https://hackerone.com/reports/1142140 ### For more information If you have any questions or comments about this advisory: * Open an issue in HackerOne

Database specific
{
    "cpes": [
        "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / wordpress-multisite

Package

Name
wordpress-multisite
Purl
pkg:bitnami/wordpress-multisite

Severity

  • 7.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
5.0.0
Fixed
5.8.0