First published: Thu Sep 09 2021(Updated: )
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions the widgets editor introduced in WordPress 5.8 beta 1 has improper handling of HTML input in the Custom HTML feature. This leads to stored XSS in the custom HTML widget. This has been patched in WordPress 5.8. It was only present during the testing/beta phase of WordPress 5.8.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress WordPress | =5.8-beta1 | |
WordPress WordPress | =5.8-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-39202 is high with a CVSS score of 5.4.
CVE-2021-39202 affects WordPress versions 5.8 beta 1 and 5.8 beta 2.
CVE-2021-39202 is a stored cross-site scripting (XSS) vulnerability.
To fix CVE-2021-39202 in WordPress, update to a version that includes the security patch.
More information about CVE-2021-39202 can be found in the GitHub advisory and HackerOne report.