vulnerability
Wordpress: CVE-2020-4050: In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:S/C:P/I:P/A:P) | Jun 12, 2020 | Feb 6, 2024 | Aug 11, 2025 |
Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
Jun 12, 2020
Added
Feb 6, 2024
Modified
Aug 11, 2025
Description
In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).
Solutions
wordpress-upgrade-3_7_34wordpress-upgrade-3_8_34wordpress-upgrade-3_9_32wordpress-upgrade-4_0_31wordpress-upgrade-4_1_31wordpress-upgrade-4_2_28wordpress-upgrade-4_3_24wordpress-upgrade-4_4_23wordpress-upgrade-4_5_22wordpress-upgrade-4_6_19wordpress-upgrade-4_7_18wordpress-upgrade-4_8_14wordpress-upgrade-4_9_15wordpress-upgrade-5_0_10wordpress-upgrade-5_1_6wordpress-upgrade-5_2_7wordpress-upgrade-5_3_4wordpress-upgrade-5_4_2
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.