Show filters
2 Total Results
Displaying 1-2 of 2
Sort by:
Attacker Value
Unknown

Stored cross-site scripting (XSS) in WordPress through 'wp_targeted_link_rel'

Disclosure Date: January 09, 2020 (last updated November 08, 2023)
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-20043. Reason: This candidate is a duplicate of CVE-2019-20043. Notes: All CVE users should reference CVE-2019-20043 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
0
Attacker Value
Unknown

CVE-2019-20043

Disclosure Date: December 27, 2019 (last updated October 06, 2023)
In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.