WordPress 3.9-5.1 - Comment Cross-Site Scripting (XSS)



Description
According to WordPress:

"This release also includes a pair of security fixes that handle how comments are filtered and then stored in the database. With a maliciously crafted comment, a WordPress post was vulnerable to cross-site scripting."

Affects WordPresses

fixed in version 5.1.1
fixed in version 5.04
fixed in version 5.04
fixed in version 5.04
fixed in version 5.04
fixed in version 4.9.10
fixed in version 4.9.10
fixed in version 4.9.10
fixed in version 4.9.10
fixed in version 4.9.10
fixed in version 4.9.10
fixed in version 4.9.10
fixed in version 4.9.10
fixed in version 4.9.10
fixed in version 4.9.10
fixed in version 4.8.9
fixed in version 4.8.9
fixed in version 4.8.9
fixed in version 4.8.9
fixed in version 4.8.9
fixed in version 4.8.9
fixed in version 4.8.9
fixed in version 4.8.9
fixed in version 4.8.9
fixed in version 4.7.13
fixed in version 4.7.13
fixed in version 4.7.13
fixed in version 4.7.13
fixed in version 4.7.13
fixed in version 4.7.13
fixed in version 4.7.13
fixed in version 4.7.13
fixed in version 4.7.13
fixed in version 4.7.13
fixed in version 4.7.13
fixed in version 4.7.13
fixed in version 4.7.13
fixed in version 4.6.14
fixed in version 4.6.14
fixed in version 4.6.14
fixed in version 4.6.14
fixed in version 4.6.14
fixed in version 4.6.14
fixed in version 4.6.14
fixed in version 4.6.14
fixed in version 4.6.14
fixed in version 4.6.14
fixed in version 4.6.14
fixed in version 4.6.14
fixed in version 4.6.14
fixed in version 4.6.14
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.5.17
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.4.18
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.3.19
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.2.23
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.1.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 4.0.26
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27
fixed in version 3.9.27

References

CVE 2019-9787
URL https://github.com/WordPress/WordPress/commit/0292de60ec78c5a44956765189403654fe4d080b
URL https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/
URL https://blog.ripstech.com/2019/wordpress-csrf-to-rce/

Classification

Type XSS
OWASP Top 10 A3: Cross-Site Scripting (XSS)
CWE CWE-79

Miscellaneous

Original Researcher Simon Scannell of RIPS Technologies
Submitter Ryan Dewhurst
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter ethicalhack3r
Views 21723
Verified No
WPVDB ID 9230

Timeline

Publicly Published 2019-03-13 (2 months ago)
Added 2019-03-13 (2 months ago)
Last Updated 2019-03-15 (2 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.