Vulnerability Details : CVE-2019-20041
wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.
Vulnerability category: Input validation
Threat overview for CVE-2019-20041
Top countries where our scanners detected CVE-2019-20041
Top open port discovered on systems with this issue
80
IPs affected by CVE-2019-20041 7
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2019-20041!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2019-20041
Probability of exploitation activity in the next 30 days: 0.62%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 76 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2019-20041
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2019-20041
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-20041
-
https://www.debian.org/security/2020/dsa-4599
Debian -- Security Information -- DSA-4599-1 wordpressThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/01/msg00010.html
[SECURITY] [DLA 2067-1] wordpress security updateMailing List;Third Party Advisory
-
https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/
News – WordPress 5.3.1 Security and Maintenance Release – WordPress.orgRelease Notes;Vendor Advisory
-
https://seclists.org/bugtraq/2020/Jan/8
Bugtraq: [SECURITY] [DSA 4599-1] wordpress security updateMailing List;Third Party Advisory
-
https://github.com/WordPress/wordpress-develop/commit/b1975463dd995da19bb40d3fa0786498717e3c53
Update `wp_kses_bad_protocol()` to recognize `:` on uri attribu… · WordPress/wordpress-develop@b197546 · GitHubPatch
-
https://www.debian.org/security/2020/dsa-4677
Debian -- Security Information -- DSA-4677-1 wordpressThird Party Advisory
Products affected by CVE-2019-20041
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*