From $URL: Props to Sam Thomas (jazzy2fives) for finding an XSS issue where authenticated users with low privileges are able to add JavaScript to posts in the block editor. Props to Luigi – (gubello.me) for discovering an XSS issue where authenticated users with upload permissions are able to add JavaScript to media files. Props to Ben Bidner of the WordPress Security Team for finding an open redirect issue in wp_validate_redirect(). Props to Nrimo Ing Pandum for finding an authenticated XSS issue via theme uploads. Props to Simon Scannell of RIPS Technologies for finding an issue where set-screen-option can be misused by plugins leading to privilege escalation. Props to Carolina Nymark for discovering an issue where comments from password-protected posts and pages could be displayed under certain conditions. Maintainer(s): Please cleanup vulnerable versions.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e049b95352cd5111d4c73ecbcd04125a9b881900 commit e049b95352cd5111d4c73ecbcd04125a9b881900 Author: Aaron Bauman <bman@gentoo.org> AuthorDate: 2020-06-12 03:33:21 +0000 Commit: Aaron Bauman <bman@gentoo.org> CommitDate: 2020-06-12 03:33:21 +0000 www-apps/wordpress: drop vulnerable Bug: https://bugs.gentoo.org/728006 Signed-off-by: Aaron Bauman <bman@gentoo.org> www-apps/wordpress/Manifest | 1 - www-apps/wordpress/wordpress-5.4.1.ebuild | 57 ------------------------------- 2 files changed, 58 deletions(-)