First published: Thu Sep 09 2021(Updated: )
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. ### Impact The issue allows an authenticated but low-privileged user (like contributor/author) to execute XSS in the editor. This bypasses the restrictions imposed on users who do not have the permission to post `unfiltered_html`. ### Patches This has been patched in WordPress 5.8, and will be pushed to older versions via minor releases (automatic updates). It's strongly recommended that you keep auto-updates enabled to receive the fix. ### References https://wordpress.org/news/category/releases/ https://hackerone.com/reports/1142140 ### For more information If you have any questions or comments about this advisory: * Open an issue in [HackerOne](https://hackerone.com/wordpress)
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
debian/wordpress | <=5.0.12+dfsg1-0+deb10u1<=5.7.1+dfsg1-2 | 5.8.1+dfsg1-1 5.0.14+dfsg1-0+deb10u1 5.7.3+dfsg1-0+deb11u1 |
WordPress WordPress | >=5.0<5.8 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39201 is a vulnerability in WordPress that allows an authenticated but low-privileged user to execute XSS in the editor.
The impact of CVE-2021-39201 is that it bypasses the restrictions imposed on users and allows for the execution of XSS in the editor.
WordPress versions 5.0 to 5.8 are affected by CVE-2021-39201.
You can fix CVE-2021-39201 in Debian Linux by updating to version 10.0 or 11.0.
You can find more information about CVE-2021-39201 in the following references: [link1], [link2], [link3].