Vulnerability Name: | CVE-2018-20147 (CCN-154329) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2018-12-13 | ||||||||||||||||||||||||||||||||||||
Published: | 2018-12-13 | ||||||||||||||||||||||||||||||||||||
Updated: | 2020-08-24 | ||||||||||||||||||||||||||||||||||||
Summary: | In WordPress before 4.9.9 and 5.x before 5.0.1, authors could modify metadata to bypass intended restrictions on deleting files. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-863 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-20147 Source: BID Type: Third Party Advisory, VDB Entry 106220 Source: MISC Type: Product, Vendor Advisory https://codex.wordpress.org/Version_4.9.9 Source: XF Type: UNKNOWN wp-cve201820147-sec-bypass(154329) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20190211 [SECURITY] [DLA 1673-1] wordpress security update Source: CCN Type: WordPress Web site WordPress 5.0.1 Security Release Source: MISC Type: Release Notes, Vendor Advisory https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/ Source: MISC Type: Product, Vendor Advisory https://wordpress.org/support/wordpress-version/version-5-0-1/ Source: MISC Type: Vendor Advisory https://wpvulndb.com/vulnerabilities/9169 Source: DEBIAN Type: Third Party Advisory DSA-4401 Source: MISC Type: Press/Media Coverage, Third Party Advisory https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/ | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |