Rapid7 Vulnerability & Exploit Database

Wordpress: CVE-2020-11029: Vulnerability in the stats() method of class-wp-object-cache.php can be exploited to execute cross-site scripting (XSS) attacks

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Wordpress: CVE-2020-11029: Vulnerability in the stats() method of class-wp-object-cache.php can be exploited to execute cross-site scripting (XSS) attacks

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
04/30/2020
Created
02/14/2024
Added
02/06/2024
Modified
02/06/2024

Description

In affected versions of WordPress, a vulnerability in the stats() method of class-wp-object-cache.php can be exploited to execute cross-site scripting (XSS) attacks. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).

Solution(s)

  • wordpress-upgrade-3_7_34
  • wordpress-upgrade-3_8_34
  • wordpress-upgrade-3_9_32
  • wordpress-upgrade-4_0_31
  • wordpress-upgrade-4_1_31
  • wordpress-upgrade-4_2_28
  • wordpress-upgrade-4_3_24
  • wordpress-upgrade-4_4_23
  • wordpress-upgrade-4_5_22
  • wordpress-upgrade-4_6_19
  • wordpress-upgrade-4_7_18
  • wordpress-upgrade-4_8_14
  • wordpress-upgrade-4_9_15
  • wordpress-upgrade-5_0_10
  • wordpress-upgrade-5_1_6
  • wordpress-upgrade-5_2_7
  • wordpress-upgrade-5_3_4
  • wordpress-upgrade-5_4_2

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;