Your submission was sent successfully! Close

CVE-2019-16780

Published: 26 December 2019

WordPress users with lower privileges (like contributors) can inject JavaScript code in the block editor using a specific payload, which is executed within the dashboard. This can lead to XSS if an admin opens the post in the editor. Execution of this attack does require an authenticated user. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. Automatic updates are enabled by default for minor releases and we strongly recommend that you keep them enabled.

Priority

Medium

CVSS 3 base score: 5.4

Status

Package Release Status
wordpress
Launchpad, Ubuntu, Debian
Upstream
Released (5.3.2+dfsg1-1)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(5.3.2+dfsg1-1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(5.3.2+dfsg1-1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(5.3.2+dfsg1-1)
Ubuntu 18.04 LTS (Bionic Beaver) Needs triage

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist