johnpbloch/wordpress-core vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the johnpbloch/wordpress-core package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Cross-site Request Forgery (CSRF)

<3.7.40>=3.8.0, <3.8.40>=3.9.0, <3.9.38>=4.0.0, <4.0.37>=4.1.0, <4.1.37>=4.2.0, <4.2.34>=4.3.0, <4.3.30>=4.4.0, <4.4.29>=4.5.0, <4.5.28>=4.6.0, <4.6.25>=4.7.0, <4.7.25>=4.8.0, <4.8.21>=4.9.0, <4.9.22>=5.0.0, <5.0.18>=5.1.0, <5.1.15>=5.2.0, <5.2.17>=5.3.0, <5.3.14>=5.4.0, <5.4.12>=5.5.0, <5.5.11>=5.6.0, <5.6.10>=5.7.0, <5.7.8>=5.8.0, <5.8.6>=5.9.0, <5.9.5>=6.0.0, <6.0.3
  • C
SQL Injection

<3.7.40>=3.8.0, <3.8.40>=3.9.0, <3.9.38>=4.0.0, <4.0.37>=4.1.0, <4.1.37>=4.2.0, <4.2.34>=4.3.0, <4.3.30>=4.4.0, <4.4.29>=4.5.0, <4.5.28>=4.6.0, <4.6.25>=4.7.0, <4.7.25>=4.8.0, <4.8.21>=4.9.0, <4.9.22>=5.0.0, <5.0.18>=5.1.0, <5.1.15>=5.2.0, <5.2.17>=5.3.0, <5.3.14>=5.4.0, <5.4.12>=5.5.0, <5.5.11>=5.6.0, <5.6.10>=5.7.0, <5.7.8>=5.8.0, <5.8.6>=5.9.0, <5.9.5>=6.0.0, <6.0.3
  • M
Improper Preservation of Consistency Between Independent Representations of Shared State

>=4.7.0, <4.7.27>=4.8.0, <4.8.23>=4.9.0, <4.9.24>=5.0.0, <5.0.20>=5.1.0, <5.1.17>=5.2.0, <5.2.19>=5.3.0, <5.3.16>=5.4.0, <5.4.14>=5.5.0, <5.5.13>=5.6.0, <5.6.12>=5.7.0, <5.7.10>=5.8.0, <5.8.8>=5.9.0, <5.9.8>=6.0.0, <6.0.6>=6.1.0, <6.1.4>=6.2.0, <6.2.3>=6.3.0, <6.3.2
  • M
Cross-site Scripting (XSS)

<3.7.40>=3.8.0, <3.8.40>=3.9.0, <3.9.38>=4.0.0, <4.0.37>=4.1.0, <4.1.37>=4.2.0, <4.2.34>=4.3.0, <4.3.30>=4.4.0, <4.4.29>=4.5.0, <4.5.28>=4.6.0, <4.6.25>=4.7.0, <4.7.25>=4.8.0, <4.8.21>=4.9.0, <4.9.22>=5.0.0, <5.0.18>=5.1.0, <5.1.15>=5.2.0, <5.2.17>=5.3.0, <5.3.14>=5.4.0, <5.4.12>=5.5.0, <5.5.11>=5.6.0, <5.6.10>=5.7.0, <5.7.8>=5.8.0, <5.8.6>=5.9.0, <5.9.5>=6.0.0, <6.0.3
  • M
Cross-site Scripting (XSS)

<4.1.38>=4.2.0, <4.2.35>=4.3.0, <4.3.31>=4.4.0, <4.4.30>=4.5.0, <4.5.29>=4.6.0, <4.6.26>=4.7.0, <4.7.26>=4.8.0, <4.8.22>=4.9.0, <4.9.23>=5.0.0, <5.0.19>=5.1.0, <5.1.16>=5.2.0, <5.2.18>=5.3.0, <5.3.15>=5.4.0, <5.4.13>=5.5.0, <5.5.12>=5.6.0, <5.6.11>=5.7.0, <5.7.9>=5.8.0, <5.8.7>=5.9.0, <5.9.6>=6.0.0, <6.0.4>=6.1.0, <6.1.2>=6.2.0, <6.2.1
  • M
Cross-site Scripting (XSS)

<3.7.40>=3.8.0, <3.8.40>=3.9.0, <3.9.38>=4.0.0, <4.0.37>=4.1.0, <4.1.37>=4.2.0, <4.2.34>=4.3.0, <4.3.30>=4.4.0, <4.4.29>=4.5.0, <4.5.28>=4.6.0, <4.6.25>=4.7.0, <4.7.25>=4.8.0, <4.8.21>=4.9.0, <4.9.22>=5.0.0, <5.0.18>=5.1.0, <5.1.15>=5.2.0, <5.2.17>=5.3.0, <5.3.14>=5.4.0, <5.4.12>=5.5.0, <5.5.11>=5.6.0, <5.6.10>=5.7.0, <5.7.8>=5.8.0, <5.8.6>=5.9.0, <5.9.5>=6.0.0, <6.0.3
  • M
Cross-site Scripting (XSS)

<3.7.40>=3.8.0, <3.8.40>=3.9.0, <3.9.38>=4.0.0, <4.0.37>=4.1.0, <4.1.37>=4.2.0, <4.2.34>=4.3.0, <4.3.30>=4.4.0, <4.4.29>=4.5.0, <4.5.28>=4.6.0, <4.6.25>=4.7.0, <4.7.25>=4.8.0, <4.8.21>=4.9.0, <4.9.22>=5.0.0, <5.0.18>=5.1.0, <5.1.15>=5.2.0, <5.2.17>=5.3.0, <5.3.14>=5.4.0, <5.4.12>=5.5.0, <5.5.11>=5.6.0, <5.6.10>=5.7.0, <5.7.8>=5.8.0, <5.8.6>=5.9.0, <5.9.5>=6.0.0, <6.0.3
  • C
Embedded Malicious Code

>=2.1.1, <2.1.2
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

>=5.9.0, <5.9.7>=6.0.0, <6.0.5>=6.1.0, <6.1.3>=6.2.0, <6.2.2
  • M
Improperly Controlled Modification of Dynamically-Determined Object Attributes

<3.7.38>=3.8.0, <3.8.38>=3.9.0, <3.9.36>=4.0.0, <4.0.35>=4.1.0, <4.1.35>=4.2.0, <4.2.32>=4.3.0, <4.3.28>=4.4.0, <4.4.27>=4.5.0, <4.5.26>=4.6.0, <4.6.23>=4.7.0, <4.7.23>=4.8.0, <4.8.19>=4.9.0, <4.9.20>=5.0.0, <5.0.16>=5.1.0, <5.1.13>=5.2.0, <5.2.15>=5.3.0, <5.3.12>=5.4.0, <5.4.10>=5.5.0, <5.5.9>=5.6.0, <5.6.8>=5.7.0, <5.7.6>=5.8.0, <5.8.4>=5.9.0, <5.9.2
  • M
Cross-site Scripting (XSS)

<4.1.38>=4.2.0, <4.2.35>=4.3.0, <4.3.31>=4.4.0, <4.4.30>=4.5.0, <4.5.29>=4.6.0, <4.6.26>=4.7.0, <4.7.26>=4.8.0, <4.8.22>=4.9.0, <4.9.23>=5.0.0, <5.0.19>=5.1.0, <5.1.16>=5.2.0, <5.2.18>=5.3.0, <5.3.15>=5.4.0, <5.4.13>=5.5.0, <5.5.12>=5.6.0, <5.6.11>=5.7.0, <5.7.9>=5.8.0, <5.8.7>=5.9.0, <5.9.6>=6.0.0, <6.0.4>=6.1.0, <6.1.2>=6.2.0, <6.2.1
  • M
Cross-site Scripting (XSS)

>=6.3.0, <6.3.2
  • M
Cross-site Scripting (XSS)

>=5.6.0, <5.6.12>=5.7.0, <5.7.10>=5.8.0, <5.8.8>=5.9.0, <5.9.8>=6.0.0, <6.0.6>=6.1.0, <6.1.4>=6.2.0, <6.2.3>=6.3.0, <6.3.2
  • L
Cross-site Scripting (XSS)

<3.7.39>=3.8.0, <3.8.39>=3.9.0, <3.9.37>=4.0.0, <4.0.36>=4.1.0, <4.1.36>=4.2.0, <4.2.33>=4.3.0, <4.3.29>=4.4.0, <4.4.28>=4.5.0, <4.5.27>=4.6.0, <4.6.24>=4.7.0, <4.7.24>=4.8.0, <4.8.20>=4.9.0, <4.9.21>=5.0.0, <5.0.17>=5.1.0, <5.1.14>=5.2.0, <5.2.16>=5.3.0, <5.3.13>=5.4.0, <5.4.11>=5.5.0, <5.5.10>=5.6.0, <5.6.9>=5.7.0, <5.7.7>=5.8.0, <5.8.5>=5.9.0, <5.9.4>=6.0.0, <6.0.2
  • H
SQL Injection

>=3.8.1, <3.8.2
  • M
Information Exposure

<3.7.40>=3.8.0, <3.8.40>=3.9.0, <3.9.38>=4.0.0, <4.0.37>=4.1.0, <4.1.37>=4.2.0, <4.2.34>=4.3.0, <4.3.30>=4.4.0, <4.4.29>=4.5.0, <4.5.28>=4.6.0, <4.6.25>=4.7.0, <4.7.25>=4.8.0, <4.8.21>=4.9.0, <4.9.22>=5.0.0, <5.0.18>=5.1.0, <5.1.15>=5.2.0, <5.2.17>=5.3.0, <5.3.14>=5.4.0, <5.4.12>=5.5.0, <5.5.11>=5.6.0, <5.6.10>=5.7.0, <5.7.8>=5.8.0, <5.8.6>=5.9.0, <5.9.5>=6.0.0, <6.0.3
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

>=5.9.0, <5.9.6>=6.0.0, <6.0.4>=6.1.0, <6.1.2>=6.2.0, <6.2.1
  • M
Information Exposure

<3.7.40>=3.8.0, <3.8.40>=3.9.0, <3.9.38>=4.0.0, <4.0.37>=4.1.0, <4.1.37>=4.2.0, <4.2.34>=4.3.0, <4.3.30>=4.4.0, <4.4.29>=4.5.0, <4.5.28>=4.6.0, <4.6.25>=4.7.0, <4.7.25>=4.8.0, <4.8.21>=4.9.0, <4.9.22>=5.0.0, <5.0.18>=5.1.0, <5.1.15>=5.2.0, <5.2.17>=5.3.0, <5.3.14>=5.4.0, <5.4.12>=5.5.0, <5.5.11>=5.6.0, <5.6.10>=5.7.0, <5.7.8>=5.8.0, <5.8.6>=5.9.0, <5.9.5>=6.0.0, <6.0.3
  • M
Improper Input Validation

<4.1.39>=4.2.0, <4.2.36>=4.3.0, <4.3.32>=4.4.0, <4.4.31>=4.5.0, <4.5.30>=4.6.0, <4.6.27>=4.7.0, <4.7.27>=4.8.0, <4.8.23>=4.9.0, <4.9.24>=5.0.0, <5.0.20>=5.1.0, <5.1.17>=5.2.0, <5.2.19>=5.3.0, <5.3.16>=5.4.0, <5.4.14>=5.5.0, <5.5.13>=5.6.0, <5.6.12>=5.7.0, <5.7.10>=5.8.0, <5.8.8>=5.9.0, <5.9.8>=6.0.0, <6.0.6>=6.1.0, <6.1.4>=6.2.0, <6.2.3>=6.3.0, <6.3.2
  • M
Cross-site Request Forgery (CSRF)

<4.1.38>=4.2.0, <4.2.35>=4.3.0, <4.3.31>=4.4.0, <4.4.30>=4.5.0, <4.5.29>=4.6.0, <4.6.26>=4.7.0, <4.7.26>=4.8.0, <4.8.22>=4.9.0, <4.9.23>=5.0.0, <5.0.19>=5.1.0, <5.1.16>=5.2.0, <5.2.18>=5.3.0, <5.3.15>=5.4.0, <5.4.13>=5.5.0, <5.5.12>=5.6.0, <5.6.11>=5.7.0, <5.7.9>=5.8.0, <5.8.7>=5.9.0, <5.9.6>=6.0.0, <6.0.4>=6.1.0, <6.1.2>=6.2.0, <6.2.1
  • M
Exposure of Data Element to Wrong Session

<3.7.40>=3.8.0, <3.8.40>=3.9.0, <3.9.38>=4.0.0, <4.0.37>=4.1.0, <4.1.37>=4.2.0, <4.2.34>=4.3.0, <4.3.30>=4.4.0, <4.4.29>=4.5.0, <4.5.28>=4.6.0, <4.6.25>=4.7.0, <4.7.25>=4.8.0, <4.8.21>=4.9.0, <4.9.22>=5.0.0, <5.0.18>=5.1.0, <5.1.15>=5.2.0, <5.2.17>=5.3.0, <5.3.14>=5.4.0, <5.4.12>=5.5.0, <5.5.11>=5.6.0, <5.6.10>=5.7.0, <5.7.8>=5.8.0, <5.8.6>=5.9.0, <5.9.5>=6.0.0, <6.0.3
  • M
SQL Injection

<3.7.39>=3.8.0, <3.8.39>=3.9.0, <3.9.37>=4.0.0, <4.0.36>=4.1.0, <4.1.36>=4.2.0, <4.2.33>=4.3.0, <4.3.29>=4.4.0, <4.4.28>=4.5.0, <4.5.27>=4.6.0, <4.6.24>=4.7.0, <4.7.24>=4.8.0, <4.8.20>=4.9.0, <4.9.21>=5.0.0, <5.0.17>=5.1.0, <5.1.14>=5.2.0, <5.2.16>=5.3.0, <5.3.13>=5.4.0, <5.4.11>=5.5.0, <5.5.10>=5.6.0, <5.6.9>=5.7.0, <5.7.7>=5.8.0, <5.8.5>=5.9.0, <5.9.4>=6.0.0, <6.0.2
  • M
Open Redirect

<3.7.40>=3.8.0, <3.8.40>=3.9.0, <3.9.38>=4.0.0, <4.0.37>=4.1.0, <4.1.37>=4.2.0, <4.2.34>=4.3.0, <4.3.30>=4.4.0, <4.4.29>=4.5.0, <4.5.28>=4.6.0, <4.6.25>=4.7.0, <4.7.25>=4.8.0, <4.8.21>=4.9.0, <4.9.22>=5.0.0, <5.0.18>=5.1.0, <5.1.15>=5.2.0, <5.2.17>=5.3.0, <5.3.14>=5.4.0, <5.4.12>=5.5.0, <5.5.11>=5.6.0, <5.6.10>=5.7.0, <5.7.8>=5.8.0, <5.8.6>=5.9.0, <5.9.5>=6.0.0, <6.0.3
  • M
Use of a Key Past its Expiration Date

<5.2.13>=5.3.0, <5.3.10>=5.4.0, <5.4.8>=5.5.0, <5.5.7>=5.6.0, <5.6.6>=5.7.0, <5.7.4>=5.8.0, <5.8.2
  • M
Cross-site Scripting (XSS)

>=5.9.0, <5.9.2
  • L
Cross-site Scripting (XSS)

<6.0.2
  • L
Directory Traversal

>=4.1.0, <4.1.41>=4.2.0, <4.2.38>=4.3.0, <4.3.34>=4.4.0, <4.4.33>=4.5.0, <4.5.32>=4.6.0, <4.6.29>=4.7.0, <4.7.29>=4.8.0, <4.8.25>=4.9.0, <4.9.26>=5.0.0, <5.0.22>=5.1.0, <5.1.19>=5.2.0, <5.2.21>=5.3.0, <5.3.18>=5.4.0, <5.4.16>=5.5.0, <5.5.15>=5.6.0, <5.6.14>=5.7.0, <5.7.12>=5.8.0, <5.8.10>=5.9.0, <5.9.10>=6.0.0, <6.0.9>=6.1.0, <6.1.7>=6.2.0, <6.2.6>=6.3.0, <6.3.5>=6.4.0, <6.4.4>=6.5.0, <6.5.6
  • M
Cross-site Scripting (XSS)

>=5.9.0, <5.9.10>=6.0.0, <6.0.9>=6.1.0, <6.1.7>=6.2.0, <6.2.6>=6.3.0, <6.3.5>=6.4.0, <6.4.5>=6.5.0, <6.5.5
  • M
Cross-site Scripting (XSS)

>=5.9.0, <5.9.10>=6.0.0, <6.0.9>=6.1.0, <6.1.7>=6.2.0, <6.2.6>=6.3.0, <6.3.5>=6.4.0, <6.4.5>=6.5.0, <6.5.5
  • H
Cross-site Scripting (XSS)

>=6.0.0, <6.1.6>=6.2.0, <6.2.5>=6.3.0, <6.3.4>=6.4.0, <6.4.4>=6.5.0, <6.5.2
  • M
Information Exposure

<6.5.0
  • M
Exposure of Sensitive Information to an Unauthorized Actor

>=6.3.0, <6.3.2>=6.2.0, <6.2.3>=6.1.0, <6.1.4>=6.0.0, <6.0.6>=5.9.0, <5.9.8>=5.8.0, <5.8.8>=5.7.0, <5.7.10>=5.6.0, <5.6.12>=5.5.0, <5.5.13>=5.4.0, <5.4.14>=5.3.0, <5.3.16>=5.2.0, <5.2.19>=5.1.0, <5.1.17>=5.0.0, <5.0.20>=4.0.0, <4.9.24>=4.8.0, <4.8.23>=4.7.0, <4.7.27
  • M
Cross-site Scripting (XSS)

>=5.9.0, <5.9.8>=6.0.0, <6.0.6>=6.1.0, <6.1.4>=6.2.0, <6.2.3>=6.3.0, <6.3.2
  • M
Information Exposure

>=4.1.0, <4.1.39>=4.2.0, <4.2.36>=4.3.0, <4.3.32>=4.4.0, <4.4.31>=4.5.0, <4.5.30>=4.6.0, <4.6.27>=4.7.0, <4.7.27>=4.8.0, <4.8.23>=4.9.0, <4.9.24>=5.0.0, <5.0.20>=5.1.0, <5.1.17>=5.2.0, <5.2.19>=5.3.0, <5.3.16>=5.4.0, <5.4.14>=5.5.0, <5.5.13>=5.6.0, <5.6.12>=5.7.0, <5.7.10>=5.8.0, <5.8.8>=5.9.0, <5.9.8>=6.0.0, <6.0.6>=6.1.0, <6.1.4>=6.2.0, <6.2.3>=6.3.0, <6.3.2
  • M
Directory Traversal

>=4.1.0, <4.1.38>=4.2.0, <4.2.35>=4.3.0, <4.3.31>=4.4.0, <4.4.30>=4.5.0, <4.5.29>=4.6.0, <4.6.26>=4.7.0, <4.7.26>=4.8.0, <4.8.22>=4.0.0, <4.9.23>=5.0.0, <5.0.19>=5.1.0, <5.1.16>=5.2.0, <5.2.18>=5.3.0, <5.3.15>=5.4.0, <5.4.13>=5.5.0, <5.5.12>=5.6.0, <5.6.11>=5.7.0, <5.7.9>=5.8.0, <5.8.7>=5.9.0, <5.9.6>=6.0.0, <6.0.4>=6.1.0, <6.1.2>=6.2.0, <6.2.1
  • M
Denial of Service (DoS)

>=0.0.0
  • H
Denial of Service (DoS)

<5.1
  • M
Server-side Request Forgery (SSRF)

>=0.0.0
  • H
SQL Injection

<3.7.37>=3.8, <5.8.3
  • H
Arbitrary Code Execution

<5.8
  • H
Arbitrary Code Execution

<4.9.9>=5.0.0, <5.0.1