Unrated severityNVD Advisory· Published Sep 9, 2021· Updated Aug 4, 2024
Authenticated cross-site scripting (XSS) in WordPress editor
CVE-2021-39201
Description
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database.
Impact
The issue allows an authenticated but low-privileged user (like contributor/author) to execute XSS in the editor. This bypasses the restrictions imposed on users who do not have the permission to post unfiltered_html.
Patches
This has been patched in WordPress 5.8, and will be pushed to older versions via minor releases (automatic updates). It's strongly recommended that you keep auto-updates enabled to receive the fix.
References https://wordpress.org/news/category/releases/ https://hackerone.com/reports/1142140
For more information
If you have any questions or comments about this advisory: * Open an issue in HackerOne
Affected products
3- osv-coords2 versions
>= 5.0.0, < 5.8.0+ 1 more
- (no CPE)range: >= 5.0.0, < 5.8.0
- (no CPE)range: >= 5.0.0, < 5.8.0
- WordPress/wordpress-developv5Range: >= 5.0, < 5.8.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.debian.org/security/2021/dsa-4985mitrevendor-advisoryx_refsource_DEBIAN
- github.com/WordPress/wordpress-develop/security/advisories/GHSA-wh69-25hr-h94vmitrex_refsource_CONFIRM
- hackerone.com/reports/1142140mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.