Bug 2244113 (CVE-2023-39999) - CVE-2023-39999 wordpress: potential sensitive information exposure from unauthorized actors
Summary: CVE-2023-39999 wordpress: potential sensitive information exposure from unaut...
Keywords:
Status: NEW
Alias: CVE-2023-39999
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2244114 2244115
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-10-13 20:30 UTC by Robb Gatica
Modified: 2023-10-13 20:30 UTC (History)
0 users

Fixed In Version: wordpress 6.3.2
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Robb Gatica 2023-10-13 20:30:34 UTC
The latest Wordpress security release (6.3.2) addresses the below information and other vulnerabilities. https://wordpress.org/news/2023/10/wordpress-6-3-2-maintenance-and-security-release/

***

Exposure of Sensitive Information to an Unauthorized Actor in WordPress from 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.13, from 6.0 through 6.0.5, from 5.9 through 5.9.7, from 5.8 through 5.8.7, from 5.7 through 5.7.9, from 5.6 through 5.6.11, from 5.5 through 5.5.12, from 5.4 through 5.4.13, from 5.3 through 5.3.15, from 5.2 through 5.2.18, from 5.1 through 5.1.16, from 5.0 through 5.0.19, from 4.9 through 4.9.23, from 4.8 through 4.8.22, from 4.7 through 4.7.26, from 4.6 through 4.6.26, from 4.5 through 4.5.29, from 4.4 through 4.4.30, from 4.3 through 4.3.31, from 4.2 through 4.2.35, from 4.1 through 4.1.38.

https://patchstack.com/database/vulnerability/wordpress/wordpress-wordpress-core-core-6-3-2-contributor-comment-read-on-private-and-password-protected-post-vulnerability?_s_id=cve
https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve

Comment 1 Robb Gatica 2023-10-13 20:30:52 UTC
Created wordpress tracking bugs for this issue:

Affects: epel-all [bug 2244114]
Affects: fedora-all [bug 2244115]


Note You need to log in before you can comment on or make changes to this bug.