In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://wpvulndb.com/vulnerabilities/9975 | third party advisory release notes |
https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/ | release notes vendor advisory |
https://core.trac.wordpress.org/changeset/46894/trunk | patch |
https://github.com/WordPress/wordpress-develop/commit/1f7f3f1f59567e2504f0fbebd51ccf004b3ccb1d | patch |
https://blog.ripstech.com/filter/vulnerabilities/ | not applicable |
https://seclists.org/bugtraq/2020/Jan/8 | third party advisory mailing list |
https://www.debian.org/security/2020/dsa-4599 | third party advisory vendor advisory |
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-xvg2-m2f4-83m7 | third party advisory |
https://hackerone.com/reports/509930 | third party advisory |
https://www.debian.org/security/2020/dsa-4677 | third party advisory vendor advisory |