CVE-2021-39202

WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions the widgets editor introduced in WordPress 5.8 beta 1 has improper handling of HTML input in the Custom HTML feature. This leads to stored XSS in the custom HTML widget. This has been patched in WordPress 5.8. It was only present during the testing/beta phase of WordPress 5.8.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wordpress:wordpress:5.8:beta1:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:5.8:beta2:*:*:*:*:*:*

History

24 Sep 2021, 13:53

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.6
v2 : 3.5
v3 : 5.4
References (MISC) https://hackerone.com/reports/1222797 - (MISC) https://hackerone.com/reports/1222797 - Permissions Required
References (CONFIRM) https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-fr6h-3855-j297 - (CONFIRM) https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-fr6h-3855-j297 - Third Party Advisory
CPE cpe:2.3:a:wordpress:wordpress:5.8:beta2:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:5.8:beta1:*:*:*:*:*:*

09 Sep 2021, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-09-09 22:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-39202

Mitre link : CVE-2021-39202

CVE.ORG link : CVE-2021-39202


JSON object : View

Products Affected

wordpress

  • wordpress
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')