First published: Fri Oct 13 2023(Updated: )
Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.
Credit: audit@patchstack.com audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress WordPress | >=4.1<=4.1.38 | |
WordPress WordPress | >=4.2<=4.2.35 | |
WordPress WordPress | >=4.3<=4.3.31 | |
WordPress WordPress | >=4.4<=4.4.30 | |
WordPress WordPress | >=4.5<=4.5.29 | |
WordPress WordPress | >=4.6<=4.6.26 | |
WordPress WordPress | >=4.7<=4.7.26 | |
WordPress WordPress | >=4.8<=4.8.22 | |
WordPress WordPress | >=4.9<=4.9.23 | |
WordPress WordPress | >=5.0<=5.0.19 | |
WordPress WordPress | >=5.1<=5.1.16 | |
WordPress WordPress | >=5.2<=5.2.18 | |
WordPress WordPress | >=5.3<=5.3.15 | |
WordPress WordPress | >=5.4<=5.4.13 | |
WordPress WordPress | >=5.5<=5.5.12 | |
WordPress WordPress | >=5.6<=5.6.11 | |
WordPress WordPress | >=5.7<=5.7.9 | |
WordPress WordPress | >=5.8<=5.8.7 | |
WordPress WordPress | >=5.9<=5.9.7 | |
WordPress WordPress | >=6.0<=6.0.5 | |
WordPress WordPress | >=6.1<=6.1.3 | |
WordPress WordPress | >=6.2<=6.2.2 | |
WordPress WordPress | >=6.3<6.3.2 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 |
https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve
Update to suitable (6.3.2, 6.2.3, 6.1.4, 6.0.6, 5.9.8, 5.8.8, 5.7.10, 5.6.12, 5.5.13, 5.4.14, 5.3.16, 5.2.19, 5.1.17, 5.0.20, 4.9.24, 4.8.23, 4.7.27, 4.6.27, 4.5.30, 4.4.31, 4.3.32, 4.2.36, 4.1.39) or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39999 is a vulnerability in WordPress that allows exposure of sensitive information to an unauthorized actor.
The severity of CVE-2023-39999 is medium, with a CVSS score of 4.3.
CVE-2023-39999 affects WordPress versions 6.3 through 6.3.1, as well as several other versions listed in the vulnerability description.
To fix CVE-2023-39999, users should update their WordPress installation to version 6.3.2 or higher.
More information about CVE-2023-39999 can be found in the references provided: [reference 1](https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve), [reference 2](https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve).