Information Disclosure Affecting johnpbloch/wordpress package, versions >=5.4.0, <5.4.1>=5.3.0, <5.3.3>=5.2.0, <5.2.6>=5.1.0, <5.1.5>=5.0.0, <5.0.9>=4.0.0, <4.9.14>=4.8.0, <4.8.13>=4.7.0, <4.7.17>=4.6.0, <4.6.18>=4.5.0, <4.5.21>=4.4.0, <4.4.22>=4.3.0, <4.3.23>=4.2.0, <4.2.27>=4.1.0, <4.1.30>=4.0.0, <4.0.30>=3.9.0, <3.9.31>=3.8.0, <3.8.33>=3.7.0, <3.7.33


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.27% (69th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-JOHNPBLOCHWORDPRESS-568023
  • published1 May 2020
  • disclosed1 May 2020
  • creditUnknown

Introduced: 1 May 2020

CVE-2020-11028  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade johnpbloch/wordpress to version 5.4.1, 5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33 or higher.

Overview

johnpbloch/wordpress is a software you can use to create a beautiful website, blog, or app.

Affected versions of this package are vulnerable to Information Disclosure. In some private posts, which were previously public, can result in unauthenticated disclosure under a specific set of conditions.

CVSS Scores

version 3.1