CVE-2018-20151
14.12.2018, 20:29
In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page could be read by a search engine's web crawler if an unusual configuration were chosen. The search engine could then index and display a user's e-mail address and (rarely) the password that was generated by default.Enginsight
| Vendor | Product | Version |
|---|---|---|
| wordpress | wordpress | 𝑥 < 4.9.9 |
| wordpress | wordpress | 5.0 ≤ 𝑥 < 5.0.1 |
| debian | debian_linux | 8.0 |
| debian | debian_linux | 9.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References