|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for wordpress (DLA-2208-1)|
|Summary:||The remote host is missing an update for the 'wordpress'; package(s) announced via the DLA-2208-1 advisory.|
The remote host is missing an update for the 'wordpress'
package(s) announced via the DLA-2208-1 advisory.
Multiple CVE(s) were discovered in the src:wordpress package.
Files with a specially crafted name when uploaded to the
Media section can lead to script execution upon accessing
the file. This requires an authenticated user with privileges
to upload files.
A password reset link emailed to a user does not expire upon
changing the user password. Access would be needed to the email
account of the user by a malicious party for successful execution.
Some private posts, which were previously public, can result in
unauthenticated disclosure under a specific set of conditions.
A vulnerability in the stats() method of class-wp-object-cache.php
can be exploited to execute cross-site scripting (XSS) attacks.
'wordpress' package(s) on Debian Linux.
For Debian 8 'Jessie', these problems have been fixed in version
We recommend that you upgrade your wordpress packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-11026|
Common Vulnerability Exposure (CVE) ID: CVE-2020-11027
Common Vulnerability Exposure (CVE) ID: CVE-2020-11028
Common Vulnerability Exposure (CVE) ID: CVE-2020-11029
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.