First published: Fri Dec 14 2018(Updated: )
In WordPress before 4.9.9 and 5.x before 5.0.1, authors could bypass intended restrictions on post types via crafted input.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
WordPress | <4.9.9 | |
WordPress | >=5.0<5.0.1 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20152 has a medium severity rating due to the potential for unauthorized access to post types.
To fix CVE-2018-20152, upgrade WordPress to version 5.0.1 or later.
CVE-2018-20152 affects WordPress versions prior to 4.9.9 and between 5.0 and 5.0.1.
CVE-2018-20152 allows authors to bypass restrictions that are intended to limit access to certain post types.
CVE-2018-20152 is not classified as critical, but it poses risks that should be addressed through updates.