vulnerability
Wordpress: CVE-2020-4050: In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:S/C:P/I:P/A:P) | Jun 12, 2020 | Feb 6, 2024 | Nov 26, 2024 |
Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
Jun 12, 2020
Added
Feb 6, 2024
Modified
Nov 26, 2024
Description
In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).
Solution(s)
wordpress-upgrade-3_7_34wordpress-upgrade-3_8_34wordpress-upgrade-3_9_32wordpress-upgrade-4_0_31wordpress-upgrade-4_1_31wordpress-upgrade-4_2_28wordpress-upgrade-4_3_24wordpress-upgrade-4_4_23wordpress-upgrade-4_5_22wordpress-upgrade-4_6_19wordpress-upgrade-4_7_18wordpress-upgrade-4_8_14wordpress-upgrade-4_9_15wordpress-upgrade-5_0_10wordpress-upgrade-5_1_6wordpress-upgrade-5_2_7wordpress-upgrade-5_3_4wordpress-upgrade-5_4_2

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.