CVE-2020-11027
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/04/2020
Last modified:
20/06/2023
Description
In affected versions of WordPress, a password reset link emailed to a user does not expire upon changing the user password. Access would be needed to the email account of the user by a malicious party for successful execution. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Base Score 2.0
5.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 3.7 (including) | 3.7.33 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 3.8 (including) | 3.8.33 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 3.9 (including) | 3.9.31 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.0 (including) | 4.0.30 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.1 (including) | 4.1.30 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.2 (including) | 4.2.27 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.3 (including) | 4.3.23 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.4 (including) | 4.4.22 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.5 (including) | 4.5.21 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.6 (including) | 4.6.18 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.7 (including) | 4.7.17 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.8 (including) | 4.8.13 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/173034/WordPress-Theme-Medic-1.0.0-Weak-Password-Recovery-Mechanism.html
- https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-ww7v-jg8c-q6jw
- https://lists.debian.org/debian-lts-announce/2020/05/msg00011.html
- https://wordpress.org/support/wordpress-version/version-5-4-1/#security-updates
- https://www.debian.org/security/2020/dsa-4677



