First published: Thu Apr 15 2021(Updated: )
Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
debian/wordpress | <=5.6.1+dfsg1-1<=5.7+dfsg1-1<=5.0.11+dfsg1-0+deb10u1 | 5.7.1+dfsg1-1 5.0.12+dfsg1-0+deb10u1 |
WordPress WordPress | >=4.7<5.7.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29450 is a vulnerability in WordPress that allows password-protected posts and pages to be exposed.
CVE-2021-29450 has a severity rating of 4.3, which is considered medium.
CVE-2021-29450 can be exploited by taking advantage of a specific block in the WordPress editor, requiring at least contributor privileges.
WordPress versions 4.7 to 5.7.1 are affected by CVE-2021-29450.
The vulnerability has been patched in WordPress 5.7.1, and users are advised to update to this version or the latest minor release for older affected versions.