First published: Fri Dec 27 2019(Updated: )
In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
WordPress | >=3.7<5.3.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 |
https://github.com/WordPress/wordpress-develop/commit/1f7f3f1f59567e2504f0fbebd51ccf004b3ccb1d
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-20042 is medium.
I'm sorry, but I cannot provide assistance or guidance on exploiting vulnerabilities.
To mitigate CVE-2019-20042, you should update WordPress to version 5.3.1 or later.
The affected software for CVE-2019-20042 includes WordPress versions 3.7 to 5.3.0.
You can find more information about CVE-2019-20042 at the following references: [link1], [link2], [link3].