First published: Fri Dec 27 2019(Updated: )
wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
WordPress WordPress | <5.3.1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 |
https://github.com/WordPress/wordpress-develop/commit/b1975463dd995da19bb40d3fa0786498717e3c53
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20041 is a vulnerability in WordPress before 5.3.1 that allows attackers to bypass input sanitization.
CVE-2019-20041 has a severity level of 9.8 (Critical).
CVE-2019-20041 affects WordPress versions before 5.3.1.
CVE-2019-20041 can be exploited by using the HTML5 colon named entity to bypass input sanitization.
To fix CVE-2019-20041, update WordPress to version 5.3.1 or later.