Unrated severityNVD Advisory· Published Apr 30, 2020· Updated Aug 4, 2024
Password reset links invalidation issue in WordPress
CVE-2020-11027
Description
In affected versions of WordPress, a password reset link emailed to a user does not expire upon changing the user password. Access would be needed to the email account of the user by a malicious party for successful execution. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).
Affected products
3- osv-coords2 versions
>= 3.7.0, < 3.7.33+ 1 more
- (no CPE)range: >= 3.7.0, < 3.7.33
- (no CPE)range: >= 3.7.0, < 3.7.33
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- www.debian.org/security/2020/dsa-4677mitrevendor-advisory
- lists.debian.org/debian-lts-announce/2020/05/msg00011.htmlmitremailing-list
- packetstormsecurity.com/files/173034/WordPress-Theme-Medic-1.0.0-Weak-Password-Recovery-Mechanism.htmlmitre
- github.com/WordPress/wordpress-develop/security/advisories/GHSA-ww7v-jg8c-q6jwmitre
- wordpress.org/support/wordpress-version/version-5-4-1/mitre
News mentions
0No linked articles in our index yet.