Description
In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
- Attack Vector
- network
- Complexity
- high
- Privileges
- low
- User Action
- none
- Scope
- changed
- Confidentiality
- none
- Integrity
- low
- Availability
- none
- Weaknesses
- CWE-288
Metadata
- Primary Vendor
- WORDPRESS
- Published
- 6/12/2020
- Last Modified
- 11/21/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
wordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpresswordpress : wordpressfedoraproject : fedorafedoraproject : fedoradebian : debian_linuxdebian : debian_linuxdebian : debian_linux
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.