CVE-2020-11027
30.04.2020, 23:15
In affected versions of WordPress, a password reset link emailed to a user does not expire upon changing the user password. Access would be needed to the email account of the user by a malicious party for successful execution. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).Enginsight
Vendor | Product | Version |
---|---|---|
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
wordpress | wordpress | 3.7 ≤ 𝑥 < 3.7.33 |
wordpress | wordpress | 3.8 ≤ 𝑥 < 3.8.33 |
wordpress | wordpress | 3.9 ≤ 𝑥 < 3.9.31 |
wordpress | wordpress | 4.0 ≤ 𝑥 < 4.0.30 |
wordpress | wordpress | 4.1 ≤ 𝑥 < 4.1.30 |
wordpress | wordpress | 4.2 ≤ 𝑥 < 4.2.27 |
wordpress | wordpress | 4.3 ≤ 𝑥 < 4.3.23 |
wordpress | wordpress | 4.4 ≤ 𝑥 < 4.4.22 |
wordpress | wordpress | 4.5 ≤ 𝑥 < 4.5.21 |
wordpress | wordpress | 4.6 ≤ 𝑥 < 4.6.18 |
wordpress | wordpress | 4.7 ≤ 𝑥 < 4.7.17 |
wordpress | wordpress | 4.8 ≤ 𝑥 < 4.8.13 |
wordpress | wordpress | 4.9 ≤ 𝑥 < 4.9.14 |
wordpress | wordpress | 5.0 ≤ 𝑥 < 5.0.9 |
wordpress | wordpress | 5.1 ≤ 𝑥 < 5.1.5 |
wordpress | wordpress | 5.2 ≤ 𝑥 < 5.2.6 |
wordpress | wordpress | 5.3 ≤ 𝑥 < 5.3.3 |
wordpress | wordpress | 5.4 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-672 - Operation on a Resource after Expiration or ReleaseThe software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.
- CWE-640 - Weak Password Recovery Mechanism for Forgotten PasswordThe software contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.
References