{"id":"BIT-wordpress-multisite-2020-4047","summary":"Authenticated XSS via media attachment page in WordPress","details":"In affected versions of WordPress, authenticated users with upload permissions (like authors) are able to inject JavaScript into some media file attachment pages in a certain way. This can lead to script execution in the context of a higher privileged user when the file is viewed by them. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).","aliases":["BIT-wordpress-2020-4047","CVE-2020-4047"],"modified":"2026-03-13T22:11:52.413404Z","published":"2024-03-06T11:10:57.188Z","database_specific":{"cpes":["cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"],"severity":"Medium"},"references":[{"type":"WEB","url":"https://github.com/WordPress/wordpress-develop/commit/0977c0d6b241479ecedfe19e96be69f727c3f81f"},{"type":"WEB","url":"https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-8q2w-5m27-wm27"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00000.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00011.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/773N2ZV7QEMBGKH6FBKI6Q5S3YJMW357/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ODNHXVJS25YVWYQHOCICXTLIN5UYJFDN/"},{"type":"WEB","url":"https://wordpress.org/news/2020/06/wordpress-5-4-2-security-and-maintenance-release/"},{"type":"WEB","url":"https://www.debian.org/security/2020/dsa-4709"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-4047"}],"affected":[{"package":{"name":"wordpress-multisite","ecosystem":"Bitnami","purl":"pkg:bitnami/wordpress-multisite"},"ranges":[{"type":"SEMVER","events":[{"introduced":"3.7.0"},{"fixed":"3.7.34"},{"introduced":"3.8.0"},{"fixed":"3.8.34"},{"introduced":"3.9.0"},{"fixed":"3.9.32"},{"introduced":"4.0.0"},{"fixed":"4.0.31"},{"introduced":"4.1.0"},{"fixed":"4.1.31"},{"introduced":"4.2.0"},{"fixed":"4.2.28"},{"introduced":"4.3.0"},{"fixed":"4.3.24"},{"introduced":"4.4.0"},{"fixed":"4.4.23"},{"introduced":"4.5.0"},{"fixed":"4.5.22"},{"introduced":"4.6.0"},{"fixed":"4.6.19"},{"introduced":"4.7.0"},{"fixed":"4.7.18"},{"introduced":"4.8.0"},{"fixed":"4.8.14"},{"introduced":"4.9.0"},{"fixed":"4.9.15"},{"introduced":"5.0.0"},{"fixed":"5.0.10"},{"introduced":"5.1.0"},{"fixed":"5.1.6"},{"introduced":"5.2.0"},{"fixed":"5.2.7"},{"introduced":"5.3.0"},{"fixed":"5.3.4"},{"introduced":"5.4.0"},{"fixed":"5.4.2"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/wordpress-multisite/BIT-wordpress-multisite-2020-4047.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N"}]}],"schema_version":"1.7.5"}