Vulnerability Details : CVE-2020-4050
In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).
Threat overview for CVE-2020-4050
Top countries where our scanners detected CVE-2020-4050
Top open port discovered on systems with this issue
80
IPs affected by CVE-2020-4050 82
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2020-4050!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2020-4050
Probability of exploitation activity in the next 30 days: 0.11%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 43 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2020-4050
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.0
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:P |
6.8
|
6.4
|
NIST |
3.1
|
LOW | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N |
1.6
|
1.4
|
NIST |
3.5
|
LOW | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N |
1.8
|
1.4
|
GitHub, Inc. |
CWE ids for CVE-2020-4050
-
A product requires authentication, but the product has an alternate path or channel that does not require authentication.Assigned by: security-advisories@github.com (Primary)
References for CVE-2020-4050
-
https://www.debian.org/security/2020/dsa-4709
Debian -- Security Information -- DSA-4709-1 wordpressThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/773N2ZV7QEMBGKH6FBKI6Q5S3YJMW357/
[SECURITY] Fedora 31 Update: wordpress-5.4.2-1.fc31 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://wordpress.org/news/2020/06/wordpress-5-4-2-security-and-maintenance-release/
News – WordPress 5.4.2 Security and Maintenance Release – WordPress.orgRelease Notes;Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2020/09/msg00011.html
[SECURITY] [DLA 2371-1] wordpress security updateMailing List;Third Party Advisory
-
https://github.com/WordPress/wordpress-develop/commit/b8dea76b495f0072523106c6ec46b9ea0d2a0920
Administration: Add a new filter to extend set-screen-option. · WordPress/wordpress-develop@b8dea76 · GitHubPatch
-
https://lists.debian.org/debian-lts-announce/2020/07/msg00000.html
[SECURITY] [DLA 2269-1] wordpress security updateMailing List;Third Party Advisory
-
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-4vpv-fgg2-gcqc
WordPress: 'set-screen-option' filter misuse by plugins leading to privilege escalation · Advisory · WordPress/wordpress-develop · GitHubThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ODNHXVJS25YVWYQHOCICXTLIN5UYJFDN/
[SECURITY] Fedora 32 Update: wordpress-5.4.2-1.fc32 - package-announce - Fedora Mailing-ListsThird Party Advisory
Products affected by CVE-2020-4050
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*