First published: Thu Sep 09 2021(Updated: )
WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions authenticated users who don't have permission to view private post types/data can bypass restrictions in the block editor under certain conditions. This affected WordPress 5.8 beta during the testing period. It's fixed in the final 5.8 release.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress WordPress | =5.8-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39203 is a vulnerability in WordPress that allows authenticated users without permission to view private post types/data to bypass restrictions in the block editor.
In affected versions, authenticated users who don't have permission to view private post types/data can bypass restrictions in the block editor under certain conditions.
The severity of CVE-2021-39203 is medium with a CVSS score of 6.5.
To fix the CVE-2021-39203 vulnerability in WordPress, consider upgrading to a version that includes the necessary security patches or follow the recommendations provided by WordPress.
More information about CVE-2021-39203 can be found in the following references: - [GitHub Security Advisory](https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-qxvw-qxm9-qvg6) - [HackerOne Report](https://hackerone.com/reports/1225282)