CVE-2022-4973

NameCVE-2022-4973
DescriptionWordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1018863

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wordpress (PTS)jessie, jessie (lts)4.1.35+dfsg-0+deb8u1vulnerable
stretch (security), stretch (lts), stretch4.7.23+dfsg-0+deb9u1vulnerable
buster (security), buster, buster (lts)5.0.21+dfsg1-0+deb10u1fixed
bullseye (security), bullseye5.7.11+dfsg1-0+deb11u1fixed
bookworm (security), bookworm6.1.6+dfsg1-0+deb12u1fixed
sid, trixie6.6.1+dfsg1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wordpresssourcejessie(unfixed)end-of-life
wordpresssourcestretch(unfixed)end-of-life
wordpresssourcebuster5.0.17+dfsg1-0+deb10u1
wordpresssourcebullseye5.7.8+dfsg1-0+deb11u1
wordpresssource(unstable)6.0.2+dfsg1-11018863

Notes

https://core.trac.wordpress.org/changeset/53961 (branches/6.0)
https://core.trac.wordpress.org/changeset/53973 (branches/5.0)
https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/

Search for package or bug name: Reporting problems