In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
History
                    21 Nov 2024, 05:32
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 6.0 v3 : 3.5 | 
| References | () https://github.com/WordPress/wordpress-develop/commit/b8dea76b495f0072523106c6ec46b9ea0d2a0920 - Patch | |
| References | () https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-4vpv-fgg2-gcqc - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2020/07/msg00000.html - Mailing List, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2020/09/msg00011.html - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/773N2ZV7QEMBGKH6FBKI6Q5S3YJMW357/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ODNHXVJS25YVWYQHOCICXTLIN5UYJFDN/ - | |
| References | () https://wordpress.org/news/2020/06/wordpress-5-4-2-security-and-maintenance-release/ - Release Notes, Vendor Advisory | |
| References | () https://www.debian.org/security/2020/dsa-4709 - Third Party Advisory | 
07 Nov 2023, 03:23
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
 | 
Information
                Published : 2020-06-12 16:15
Updated : 2024-11-21 05:32
NVD link : CVE-2020-4050
Mitre link : CVE-2020-4050
CVE.ORG link : CVE-2020-4050
JSON object : View
Products Affected
                debian
- debian_linux
fedoraproject
- fedora
wordpress
- wordpress
CWE
                
                    
                        
                        CWE-288
                        
            Authentication Bypass Using an Alternate Path or Channel
