CVE-2020-4048
Severity CVSS v4.0:
Pending analysis
Type:
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
Publication date:
12/06/2020
Last modified:
07/11/2023
Description
In affected versions of WordPress, due to an issue in wp_validate_redirect() and URL sanitization, an arbitrary external link can be crafted leading to unintended/open redirect when clicked. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).
Impact
Base Score 3.x
5.70
Severity 3.x
MEDIUM
Base Score 2.0
4.90
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 3.7 (including) | 3.7.34 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 3.8 (including) | 3.8.34 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 3.9 (including) | 3.9.32 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.0 (including) | 4.0.31 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.1 (including) | 4.1.31 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.2 (including) | 4.2.28 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.3 (including) | 4.3.24 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.4 (including) | 4.4.23 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.5 (including) | 4.5.22 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.6 (including) | 4.6.19 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.7 (including) | 4.7.18 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.8 (including) | 4.8.14 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.9 (including) | 4.9.15 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 5.0 (including) | 5.0.10 (excluding) |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 5.1 (including) | 5.1.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/WordPress/wordpress-develop/commit/6ef777e9a022bee2a80fa671118e7e2657e52693
- https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-q6pw-gvf4-5fj5
- https://lists.debian.org/debian-lts-announce/2020/07/msg00000.html
- https://lists.debian.org/debian-lts-announce/2020/09/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/773N2ZV7QEMBGKH6FBKI6Q5S3YJMW357/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ODNHXVJS25YVWYQHOCICXTLIN5UYJFDN/
- https://wordpress.org/news/2020/06/wordpress-5-4-2-security-and-maintenance-release/
- https://www.debian.org/security/2020/dsa-4709