Max CVSS | 5.5 | Min CVSS | 3.5 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2020-11027 | 5.5 |
In affected versions of WordPress, a password reset link emailed to a user does not expire upon changing the user password. Access would be needed to the email account of the user by a malicious party for successful execution. This has been patched i
|
20-06-2023 - 16:15 | 30-04-2020 - 23:15 | |
CVE-2020-11029 | 4.3 |
In affected versions of WordPress, a vulnerability in the stats() method of class-wp-object-cache.php can be exploited to execute cross-site scripting (XSS) attacks. This has been patched in version 5.4.1, along with all the previously affected versi
|
01-03-2023 - 16:46 | 30-04-2020 - 23:15 | |
CVE-2020-11026 | 3.5 |
In affected versions of WordPress, files with a specially crafted name when uploaded to the Media section can lead to script execution upon accessing the file. This requires an authenticated user with privileges to upload files. This has been patched
|
01-03-2023 - 16:45 | 30-04-2020 - 23:15 | |
CVE-2020-11028 | 4.3 |
In affected versions of WordPress, some private posts, which were previously public, can result in unauthenticated disclosure under a specific set of conditions. This has been patched in version 5.4.1, along with all the previously affected versions
|
14-09-2021 - 14:04 | 30-04-2020 - 23:15 | |
CVE-2020-11030 | 3.5 |
In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in v
|
07-05-2020 - 20:43 | 30-04-2020 - 23:15 | |
CVE-2020-11025 | 3.5 |
In affected versions of WordPress, a cross-site scripting (XSS) vulnerability in the navigation section of Customizer allows JavaScript code to be executed. Exploitation requires an authenticated user. This has been patched in version 5.4.1, along wi
|
07-05-2020 - 12:58 | 30-04-2020 - 22:15 |