CVE-2024-31211

EUVD-2024-29111
WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
GitHub_MCNA
5.5 MEDIUM
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
Affected Products (NVD)
VendorProductVersion
wordpresswordpress
6.4.0 ≤
𝑥
< 6.4.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
wordpress
bookworm
6.1.6+dfsg1-0+deb12u1
not-affected
bookworm (security)
6.1.9+dfsg1-0+deb12u1
fixed
bullseye
5.7.11+dfsg1-0+deb11u1
not-affected
bullseye (security)
5.7.14+dfsg1-0+deb11u1
fixed
buster
not-affected
forky
6.8.3+dfsg1-1
fixed
sid
6.8.3+dfsg1-1
fixed
trixie
6.8.1+dfsg1-1
fixed
trixie (security)
6.8.3+dfsg1-0+deb13u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
wordpress
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
mantic
ignored
noble
not-affected
oracular
not-affected
plucky
not-affected
questing
not-affected
xenial
needs-triage