Source: wordpress Version: 5.7.1+dfsg1-2 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: found -1 5.0.12+dfsg1-0+deb10u1
Hi, The following vulnerability was published for wordpress. CVE-2021-39201[0]: | WordPress is a free and open-source content management system written | in PHP and paired with a MySQL or MariaDB database. ### Impact The | issue allows an authenticated but low-privileged user (like | contributor/author) to execute XSS in the editor. This bypasses the | restrictions imposed on users who do not have the permission to post | `unfiltered_html`. ### Patches This has been patched in WordPress 5.8, | and will be pushed to older versions via minor releases (automatic | updates). It's strongly recommended that you keep auto-updates enabled | to receive the fix. ### References | https://wordpress.org/news/category/releases/ | https://hackerone.com/reports/1142140 ### For more information If you | have any questions or comments about this advisory: * Open an issue in | [HackerOne](https://hackerone.com/wordpress) If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-39201 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39201 [1] https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-wh69-25hr-h94v Regards, Salvatore