Source: wordpress
Version: 5.7.1+dfsg1-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 5.0.12+dfsg1-0+deb10u1

Hi,

The following vulnerability was published for wordpress.

CVE-2021-39201[0]:
| WordPress is a free and open-source content management system written
| in PHP and paired with a MySQL or MariaDB database. ### Impact The
| issue allows an authenticated but low-privileged user (like
| contributor/author) to execute XSS in the editor. This bypasses the
| restrictions imposed on users who do not have the permission to post
| `unfiltered_html`. ### Patches This has been patched in WordPress 5.8,
| and will be pushed to older versions via minor releases (automatic
| updates). It's strongly recommended that you keep auto-updates enabled
| to receive the fix. ### References
| https://wordpress.org/news/category/releases/
| https://hackerone.com/reports/1142140 ### For more information If you
| have any questions or comments about this advisory: * Open an issue in
| [HackerOne](https://hackerone.com/wordpress)


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-39201
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39201
[1] 
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-wh69-25hr-h94v

Regards,
Salvatore

Reply via email to