WordPress Blog Platform
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in WordPress.
WordPress EOL Dates
Ensure that you are using a supported version of WordPress. Here are some end of life, and end of support dates for WordPress.
| Release | EOL Date | Status |
|---|---|---|
| 6.9 | - |
Active
|
| 6.8 | December 2, 2025 |
EOL
WordPress 6.8 became EOL in 2025. |
| 6.7 | April 15, 2025 |
EOL
WordPress 6.7 became EOL in 2025. |
| 6.6 | November 12, 2024 |
EOL
WordPress 6.6 became EOL in 2024. |
| 6.5 | July 16, 2024 |
EOL
WordPress 6.5 became EOL in 2024. |
| 6.4 | April 2, 2024 |
EOL
WordPress 6.4 became EOL in 2024. |
| 6.3 | November 7, 2023 |
EOL
WordPress 6.3 became EOL in 2023. |
| 6.2 | August 8, 2023 |
EOL
WordPress 6.2 became EOL in 2023. |
| 6.1 | March 29, 2023 |
EOL
WordPress 6.1 became EOL in 2023. |
| 6.0 | November 1, 2022 |
EOL
WordPress 6.0 became EOL in 2022. |
| 5.9 | May 24, 2022 |
EOL
WordPress 5.9 became EOL in 2022. |
| 5.8 | January 25, 2022 |
EOL
WordPress 5.8 became EOL in 2022. |
| 5.7 | July 20, 2021 |
EOL
WordPress 5.7 became EOL in 2021. |
| 5.6 | March 9, 2021 |
EOL
WordPress 5.6 became EOL in 2021. |
| 5.5 | December 8, 2020 |
EOL
WordPress 5.5 became EOL in 2020. |
| 5.4 | August 11, 2020 |
EOL
WordPress 5.4 became EOL in 2020. |
| 5.3 | March 31, 2020 |
EOL
WordPress 5.3 became EOL in 2020. |
| 5.2 | November 12, 2019 |
EOL
WordPress 5.2 became EOL in 2019. |
| 5.1 | May 7, 2019 |
EOL
WordPress 5.1 became EOL in 2019. |
| 5.0 | February 21, 2019 |
EOL
WordPress 5.0 became EOL in 2019. |
By the Year
In 2026 there have been 0 vulnerabilities in WordPress. Last year, in 2025 WordPress had 11 security vulnerabilities published. Right now, WordPress is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 11 | 5.97 |
| 2024 | 14 | 6.31 |
| 2023 | 9 | 6.36 |
| 2022 | 9 | 6.54 |
| 2021 | 8 | 6.17 |
| 2020 | 21 | 6.65 |
| 2019 | 22 | 5.87 |
| 2018 | 16 | 8.13 |
It may take a day or so for new WordPress vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent WordPress Security Vulnerabilities
WordPress Plugins: XSS via lightGallery <=2.8.3 (Contributor+ attacks)
CVE-2025-5092
6.4 - Medium
- November 20, 2025
Multiple plugins and/or themes for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled lightGallery library (<= 2.8.3) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
XSS
WordPress Core Stored XSS (CVE-2025-58674) up to v6.8.2
CVE-2025-58674
5.9 - Medium
- September 23, 2025
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
XSS
WP <=6.8.2: Insert Sensitive Info into Outgoing Data (Contributor Priv.)
CVE-2025-58246
4.3 - Medium
- September 23, 2025
Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it. This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
Insertion of Sensitive Information Into Sent Data
WordPress XML-RPC Pingback Title Guessing (v3.5–6.8.2)
CVE-2025-54352
- July 21, 2025
WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of private and draft posts via pingback.ping XML-RPC requests. NOTE: the Supplier is not changing this behavior.
Incorrect Resource Transfer Between Spheres
WordPress XSS via ThickBox JavaScript v3.1 in various plugins
CVE-2025-2537
6.4 - Medium
- July 03, 2025
Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled ThickBox JavaScript library (version 3.1) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
XSS
WP Media Lib Module Permission Bypass
CVE-2025-48903
- June 06, 2025
Permission bypass vulnerability in the media library module Impact: Successful exploitation of this vulnerability may affect availability.
WP Plugins: SimpleLightbox 2.1.5 Stored XSS (auth)
CVE-2024-5878
6.4 - Medium
- May 20, 2025
Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled SimpleLightbox JavaScript library (version 2.1.5) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
XSS
WordPress 6.8.0 Path Traversal for Arbitrary File Download
CVE-2025-21095
- March 05, 2025
Path traversal may lead to arbitrary file download. The score without least privilege principle violation is as calculated below. In combination with other issues it may facilitate further compromise of the device. Remediation in Version 6.8.0, release date: 01-Mar-25.
Directory traversal
WP plugins XSS via Featherlight.js v1.7.13-1.7.14
CVE-2024-5667
6.4 - Medium
- March 05, 2025
Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled Featherlight.js JavaScript library (versions 1.7.13 to 1.7.14) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
XSS
WordPress Tags Unintended Disclosure via Tag Search & Tags Block
CVE-2025-26527
- February 24, 2025
Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block.
Local Media Disclosure via Missing Permission Check (CVE-2023-40108)
CVE-2023-40108
- January 21, 2025
In multiple locations, there is a possible way to access media content belonging to another user due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
WordPress Plugin '??????? ??????? ??????? ???? ????': Reflected XSS Vulnerability
CVE-2024-11331
6.1 - Medium
- December 20, 2024
The ??????? ??????? ??????? ???? ???? plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.1.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
XSS
WordPress Plugin 'Add infos to the events calendar' Stored XSS Vulnerability in 'fuss' Shortcode
CVE-2024-11875
6.4 - Medium
- December 12, 2024
The Add infos to the events calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fuss' shortcode in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
XSS
WordPress Support SVG Plugin: Stored XSS via REST API SVG File Uploads
CVE-2024-11091
6.4 - Medium
- November 26, 2024
The Support SVG Upload svg files in wordpress without hassle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG File uploads in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
XSS
Stored XSS Vulnerability in WordPress Plugin ??? ??? via Shortcodes
CVE-2024-11229
6.4 - Medium
- November 23, 2024
The ???? ??? plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's add_plus_friends and add_plus_talk shortcodes in all versions up to, and including, 1.1.18 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
XSS
Stored XSS Vulnerability in WordPress Plugin ???? ????? via mnp_purchase Shortcode
CVE-2024-11231
6.4 - Medium
- November 23, 2024
The ???? ????? plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's mnp_purchase shortcode in all versions up to, and including, 3.3.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
XSS
WordPress Bard Theme Reflected XSS Vulnerability in URL Parameter Handling
CVE-2024-9830
- November 19, 2024
The Bard theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.216. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
XSS
WordPress Core 6.0.2 Authenticated Stored XSS via the_meta()
CVE-2022-4973
5.4 - Medium
- October 16, 2024
WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.
XSS
WordPress Core <6.5.5 Stored XSS via HTML API (Contributor+)
CVE-2024-6307
6.4 - Medium
- June 25, 2024
WordPress Core is vulnerable to Stored Cross-Site Scripting via the HTML API in various versions prior to 6.5.5 due to insufficient input sanitization and output escaping on URLs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
WordPress: Path Traversal via Dashboard Plugin (<1.8.6)
CVE-2024-35162
- May 22, 2024
Path traversal vulnerability exists in Download Plugins and Themes from Dashboard versions prior to 1.8.6. If this vulnerability is exploited, a remote authenticated attacker with "switch_themes" privilege may obtain arbitrary files on the server.
WordPress Core <= 6.5.2 Stored XSS via Avatar Block Display Name
CVE-2024-4439
7.2 - High
- May 03, 2024
WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.
WordPress 6.4.3 Sensitive Info Exposure via redirect_guess_404_permalink
CVE-2023-5692
- April 05, 2024
WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_queryable' post status has been set to 'false'.
WordPress Admin Plugin Upload RCE via NonZip File, Fixed 6.4.3
CVE-2024-31210
- April 04, 2024
WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.
WordPress Unserializable WP_HTML_Token Causing Code Exec before 6.4.2
CVE-2024-31211
- April 04, 2024
WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.
WordPress Extensions XSS via Media Selection Fields (CVE-2024-21724)
CVE-2024-21724
6.1 - Medium
- February 29, 2024
Inadequate input validation for media selection fields lead to XSS vulnerabilities in various extensions.
XSS
WordPress REST API Exposes User Emails via Unrestricted Search Fields
CVE-2023-5561
5.3 - Medium
- October 16, 2023
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
WordPress Sensitive Info Exposure (4.16.3.1) CVE-2023-39999
CVE-2023-39999
4.3 - Medium
- October 13, 2023
Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.
Information Disclosure
WordPress Auth. Stored XSS in Core 5.9-6.3 & Gutenberg 16.8.
CVE-2023-38000
5.4 - Medium
- October 13, 2023
Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions.
XSS
WordPress 6.4.1: Data Leakage & DoS via Crafted Request
CVE-2023-32565
9.1 - Critical
- August 10, 2023
An attacker can send a specially crafted request which could lead to leakage of sensitive data or potentially a resource-based DoS attack. Fixed in version 6.4.1.
WordPress XSS via unsanitized clientID in Application Passwords
CVE-2023-26446
5.4 - Medium
- August 02, 2023
The users clientID at "application passwords" was not sanitized or escaped before being added to DOM. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We now sanitize the user-controllable clientID parameter. No publicly available exploits are known.
XSS
WordPress Themes <=1.3.1 Function Injection via epsilon_framework_ajax_action
CVE-2020-36708
9.8 - Critical
- June 07, 2023
The following themes for WordPress are vulnerable to Function Injections in versions up to and including Shapely <= 1.2.7, NewsMag <= 2.4.1, Activello <= 1.4.0, Illdy <= 2.1.4, Allegiant <= 1.2.2, Newspaper X <= 1.3.1, Pixova Lite <= 2.0.5, Brilliance <= 1.2.7, MedZone Lite <= 1.2.4, Regina Lite <= 2.0.4, Transcend <= 1.1.8, Affluent <= 1.1.0, Bonkers <= 1.0.4, Antreas <= 1.0.2, Sparkling <= 2.4.8, and NatureMag Lite <= 1.0.4. This is due to epsilon_framework_ajax_action. This makes it possible for unauthenticated attackers to call functions and achieve remote code execution.
WordPress Core 6.2 Unauth DT via wp_lang Param
CVE-2023-2745
5.4 - Medium
- May 17, 2023
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the wp_lang parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
Directory traversal
WordPress Admin-Only Vulnerability: No Security Risk CVE-2022-4327
CVE-2022-4327
7.2 - High
- January 16, 2023
This issue does not bear any security risk as it's only exploitable by users with administrator or super-administrator roles, who can already do what they want on their site.
WordPress <=6.1.1 wp-cron.php Schedule Timing Flaw (CVE-2023-22622)
CVE-2023-22622
5.3 - Medium
- January 05, 2023
WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits.
WordPress pingback blind SSRF TOCTOU
CVE-2022-3590
5.9 - Medium
- December 14, 2022
WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden.
TOCTTOU
WP Post by Email Auth Bypass, <6.0.3 (Fixed 6.0.3)
CVE-2022-43504
5.3 - Medium
- December 05, 2022
Improper authentication vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to obtain the email address of the user who posted a blog using the WordPress Post by Email Feature. The developer also provides new patched releases for all versions since 3.7.
authentification
CVE-2022-43497 WP XSS before 6.0.3 & 3.7 patched
CVE-2022-43497
6.1 - Medium
- December 05, 2022
Cross-site scripting vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to inject an arbitrary script. The developer also provides new patched releases for all versions since 3.7.
XSS
WordPress XSS in v<6.0.3 Unauth Script Injection (patched 3.7+)
CVE-2022-43500
6.1 - Medium
- December 05, 2022
Cross-site scripting vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to inject an arbitrary script. The developer also provides new patched releases for all versions since 3.7.
XSS
A flaw exists in Wordpress related to the 'wp-admin/press-this.php 'script improperly checking user permissions when publishing posts
CVE-2011-1762
- April 18, 2022
A flaw exists in Wordpress related to the 'wp-admin/press-this.php 'script improperly checking user permissions when publishing posts. This may allow a user with 'Contributor-level' privileges to post as if they had 'publish_posts' permission.
Authorization
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database
CVE-2022-21662
5.4 - Medium
- January 06, 2022
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Low-privileged authenticated users (like author) in WordPress core are able to execute JavaScript/perform stored XSS attack, which can affect high-privileged users. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.
XSS
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database
CVE-2022-21664
8.8 - High
- January 06, 2022
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to lack of proper sanitization in one of the classes, there's potential for unintended SQL queries to be executed. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 4.1.34. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.
SQL Injection
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database
CVE-2022-21663
7.2 - High
- January 06, 2022
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.
Marshaling, Unmarshaling
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database
CVE-2022-21661
7.5 - High
- January 06, 2022
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to improper sanitization in WP_Query, there can be cases where SQL injection is possible through plugins or themes that use it in a certain way. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this vulnerability.
SQL Injection
WordPress before 5.8 lacks support for the Update URI plugin header
CVE-2021-44223
9.8 - Critical
- November 25, 2021
WordPress before 5.8 lacks support for the Update URI plugin header. This makes it easier for remote attackers to execute arbitrary code via a supply-chain attack against WordPress installations that use any plugin for which the slug satisfies the naming constraints of the WordPress.org Plugin Directory but is not yet present in that directory.
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database
CVE-2021-39202
5.4 - Medium
- September 09, 2021
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions the widgets editor introduced in WordPress 5.8 beta 1 has improper handling of HTML input in the Custom HTML feature. This leads to stored XSS in the custom HTML widget. This has been patched in WordPress 5.8. It was only present during the testing/beta phase of WordPress 5.8.
XSS
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database
CVE-2021-39203
6.5 - Medium
- September 09, 2021
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions authenticated users who don't have permission to view private post types/data can bypass restrictions in the block editor under certain conditions. This affected WordPress 5.8 beta during the testing period. It's fixed in the final 5.8 release.
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database
CVE-2021-39201
5.4 - Medium
- September 09, 2021
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. ### Impact The issue allows an authenticated but low-privileged user (like contributor/author) to execute XSS in the editor. This bypasses the restrictions imposed on users who do not have the permission to post `unfiltered_html`. ### Patches This has been patched in WordPress 5.8, and will be pushed to older versions via minor releases (automatic updates). It's strongly recommended that you keep auto-updates enabled to receive the fix. ### References https://wordpress.org/news/category/releases/ https://hackerone.com/reports/1142140 ### For more information If you have any questions or comments about this advisory: * Open an issue in [HackerOne](https://hackerone.com/wordpress)
XSS
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database
CVE-2021-39200
5.3 - Medium
- September 09, 2021
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions output data of the function wp_die() can be leaked under certain conditions, which can include data like nonces. It can then be used to perform actions on your behalf. This has been patched in WordPress 5.8.1, along with any older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.
Information Disclosure
PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname
CVE-2020-36326
- April 28, 2021
PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.
Wordpress is an open source CMS
CVE-2021-29450
4.3 - Medium
- April 15, 2021
Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.
Information Disclosure