CVE-2020-4049
12.06.2020, 16:15
In affected versions of WordPress, when uploading themes, the name of the theme folder can be crafted in a way that could lead to JavaScript execution in /wp-admin on the themes page. This does require an admin to upload the theme, and is low severity self-XSS. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).
Vendor | Product | Version |
---|---|---|
wordpress | wordpress | 3.7 ≤ 𝑥 < 3.7.34 |
wordpress | wordpress | 3.8 ≤ 𝑥 < 3.8.34 |
wordpress | wordpress | 3.9 ≤ 𝑥 < 3.9.32 |
wordpress | wordpress | 4.0 ≤ 𝑥 < 4.0.31 |
wordpress | wordpress | 4.1 ≤ 𝑥 < 4.1.31 |
wordpress | wordpress | 4.2 ≤ 𝑥 < 4.2.28 |
wordpress | wordpress | 4.3 ≤ 𝑥 < 4.3.24 |
wordpress | wordpress | 4.4 ≤ 𝑥 < 4.4.23 |
wordpress | wordpress | 4.5 ≤ 𝑥 < 4.5.22 |
wordpress | wordpress | 4.6 ≤ 𝑥 < 4.6.19 |
wordpress | wordpress | 4.7 ≤ 𝑥 < 4.7.18 |
wordpress | wordpress | 4.8 ≤ 𝑥 < 4.8.14 |
wordpress | wordpress | 4.9 ≤ 𝑥 < 4.9.15 |
wordpress | wordpress | 5.0 ≤ 𝑥 < 5.0.10 |
wordpress | wordpress | 5.1 ≤ 𝑥 < 5.1.6 |
wordpress | wordpress | 5.2 ≤ 𝑥 < 5.2.7 |
wordpress | wordpress | 5.3.0 ≤ 𝑥 < 5.3.4 |
wordpress | wordpress | 5.4 ≤ 𝑥 < 5.4.2 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
References