Name | CVE-2022-4973 |
Description | WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1018863 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
wordpress (PTS) | bullseye (security), bullseye | 5.7.11+dfsg1-0+deb11u1 | fixed |
bookworm, bookworm (security) | 6.1.6+dfsg1-0+deb12u1 | fixed | |
sid, trixie | 6.6.1+dfsg1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
wordpress | source | buster | 5.0.17+dfsg1-0+deb10u1 | |||
wordpress | source | bullseye | 5.7.8+dfsg1-0+deb11u1 | |||
wordpress | source | (unstable) | 6.0.2+dfsg1-1 | 1018863 |
https://core.trac.wordpress.org/changeset/53961 (branches/6.0)
https://core.trac.wordpress.org/changeset/53973 (branches/5.0)
https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/