First published: Fri Dec 14 2018(Updated: )
In WordPress before 4.9.9 and 5.x before 5.0.1, when the Apache HTTP Server is used, authors could upload crafted files that bypass intended MIME type restrictions, leading to XSS, as demonstrated by a .jpg file without JPEG data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
WordPress | <4.9.9 | |
WordPress | >=5.0<5.0.1 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20149 is rated as a moderate severity vulnerability that could allow for cross-site scripting (XSS) attacks.
To fix CVE-2018-20149, update WordPress to version 5.0.1 or later, or ensure you are using an unaffected version.
CVE-2018-20149 affects WordPress versions prior to 4.9.9 and versions between 5.0.0 and 5.0.1.
Yes, CVE-2018-20149 can be exploited by unauthenticated users who can upload files.
CVE-2018-20149 can enable cross-site scripting (XSS) attacks through the upload of crafted files.