First published: Sat Oct 31 2020(Updated: )
is_protected_meta in wp-includes/meta.php in WordPress before 5.5.2 allows arbitrary file deletion because it does not properly determine whether a meta key is considered protected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
WordPress WordPress | <5.5.2 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 |
https://github.com/WordPress/wordpress-develop/commit/d5ddd6d4be1bc9fd16b7796842e6fb26315705ad
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28039 is a vulnerability in WordPress before version 5.5.2 that allows arbitrary file deletion due to improper determination of protected meta keys.
CVE-2020-28039 has a severity rating of 9.1 (critical).
CVE-2020-28039 affects WordPress versions before 5.5.2.
To fix CVE-2020-28039, you should update your WordPress installation to version 5.5.2 or later.
You can find more information about CVE-2020-28039 in the following references: [Reference 1](https://github.com/WordPress/wordpress-develop/commit/d5ddd6d4be1bc9fd16b7796842e6fb26315705ad), [Reference 2](https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/), [Reference 3](https://wpscan.com/vulnerability/10452).