WordPress 3.7-4.9.1 - MediaElement Cross-Site Scripting (XSS)

Sign up to our free email alerts service for instant vulnerability notifications!

Description
An XSS vulnerability was discovered in the Flash fallback files in MediaElement, a library that is included with WordPress. Because the Flash files are no longer needed for most use cases, they have been removed from WordPress.

Affects WordPresses

fixed in version 4.9.2
fixed in version 4.9.2
fixed in version 4.8.5
fixed in version 4.8.5
fixed in version 4.8.5
fixed in version 4.8.5
fixed in version 4.8.5
fixed in version 4.7.9
fixed in version 4.7.9
fixed in version 4.7.9
fixed in version 4.7.9
fixed in version 4.7.9
fixed in version 4.7.9
fixed in version 4.7.9
fixed in version 4.7.9
fixed in version 4.7.9
fixed in version 4.6.10
fixed in version 4.6.10
fixed in version 4.6.10
fixed in version 4.6.10
fixed in version 4.6.10
fixed in version 4.6.10
fixed in version 4.6.10
fixed in version 4.6.10
fixed in version 4.6.10
fixed in version 4.6.10
fixed in version 4.5.13
fixed in version 4.5.13
fixed in version 4.5.13
fixed in version 4.5.13
fixed in version 4.5.13
fixed in version 4.5.13
fixed in version 4.5.13
fixed in version 4.5.13
fixed in version 4.5.13
fixed in version 4.5.13
fixed in version 4.5.13
fixed in version 4.5.13
fixed in version 4.5.13
fixed in version 4.4.14
fixed in version 4.4.14
fixed in version 4.4.14
fixed in version 4.4.14
fixed in version 4.4.14
fixed in version 4.4.14
fixed in version 4.4.14
fixed in version 4.4.14
fixed in version 4.4.14
fixed in version 4.4.14
fixed in version 4.4.14
fixed in version 4.4.14
fixed in version 4.4.14
fixed in version 4.4.14
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.3.15
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.9.2
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.2.19
fixed in version 4.9.2
fixed in version 4.9.2
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.1.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 4.0.22
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.9.23
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.8.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25
fixed in version 3.7.25

References

CVE 2018-5776
URL https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
URL https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
URL https://core.trac.wordpress.org/ticket/42720

Classification

Type XSS
OWASP Top 10 A3: Cross-Site Scripting (XSS)
CWE CWE-79

Miscellaneous

Submitter ethicalhack3r
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter ethicalhack3r
Views 4032
Verified No
WPVDB ID 9006

Timeline

Publicly Published 2018-01-17 (3 months ago)
Added 2018-01-17 (3 months ago)
Last Updated 2018-01-22 (3 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.