{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-11027","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","dateUpdated":"2024-08-04T11:21:14.307Z","dateReserved":"2020-03-30T00:00:00.000Z","datePublished":"2020-04-30T00:00:00.000Z"},"containers":{"cna":{"title":"Password reset links invalidation issue in WordPress","providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-06-20T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"In affected versions of WordPress, a password reset link emailed to a user does not expire upon changing the user password. Access would be needed to the email account of the user by a malicious party for successful execution. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33)."}],"affected":[{"vendor":"WordPress","product":"WordPress","versions":[{"version":">= 5.4.0, < 5.4.1","status":"affected"},{"version":">= 5.3.0, < 5.3.3","status":"affected"},{"version":">= 5.2.0, < 5.2.6","status":"affected"},{"version":">= 5.1.0, < 5.1.5","status":"affected"},{"version":">= 5.0.0, < 5.0.9","status":"affected"},{"version":">= 4.9.0, < 4.9.14","status":"affected"},{"version":">= 4.8.0, < 4.8.13","status":"affected"},{"version":">= 4.7.0, < 4.7.17","status":"affected"},{"version":">= 4.6.0, < 4.6.18","status":"affected"},{"version":">= 4.5.0, < 4.5.21","status":"affected"},{"version":">= 4.4.0, < 4.4.22","status":"affected"},{"version":">= 4.3.0, < 4.3.23","status":"affected"},{"version":">= 4.2.0, < 4.2.27","status":"affected"},{"version":">= 4.1.0, < 4.1.30","status":"affected"},{"version":">= 4.0.0, < 4.0.30","status":"affected"},{"version":">= 3.9.0, < 3.9.31","status":"affected"},{"version":">= 3.8.0, < 3.8.33","status":"affected"},{"version":">= 3.7.0, < 3.7.33","status":"affected"}]}],"references":[{"url":"https://wordpress.org/support/wordpress-version/version-5-4-1/#security-updates"},{"url":"https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-ww7v-jg8c-q6jw"},{"name":"DSA-4677","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2020/dsa-4677"},{"name":"[debian-lts-announce] 20200511 [SECURITY] [DLA 2208-1] wordpress security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00011.html"},{"url":"http://packetstormsecurity.com/files/173034/WordPress-Theme-Medic-1.0.0-Weak-Password-Recovery-Mechanism.html"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-672: Operation on a Resource after Expiration or Release","cweId":"CWE-672"}]}],"source":{"advisory":"GHSA-ww7v-jg8c-q6jw","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T11:21:14.307Z"},"title":"CVE Program Container","references":[{"url":"https://wordpress.org/support/wordpress-version/version-5-4-1/#security-updates","tags":["x_transferred"]},{"url":"https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-ww7v-jg8c-q6jw","tags":["x_transferred"]},{"name":"DSA-4677","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2020/dsa-4677"},{"name":"[debian-lts-announce] 20200511 [SECURITY] [DLA 2208-1] wordpress security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00011.html"},{"url":"http://packetstormsecurity.com/files/173034/WordPress-Theme-Medic-1.0.0-Weak-Password-Recovery-Mechanism.html","tags":["x_transferred"]}]}]}}