Vulnerability Description
The get_allowed_mime_types function in wp-includes/functions.php in WordPress before 3.6.1 does not require the unfiltered_html capability for uploads of .htm and .html files, which might make it easier for remote authenticated users to conduct cross-site scripting (XSS) attacks via a crafted file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | <= 3.6 |
Related Weaknesses (CWE)
References
- http://codex.wordpress.org/Version_3.6.1Vendor Advisory
- http://core.trac.wordpress.org/changeset/25322PatchVendor Advisory
- http://wordpress.org/news/2013/09/wordpress-3-6-1/PatchVendor Advisory
- http://www.debian.org/security/2013/dsa-2757
- http://codex.wordpress.org/Version_3.6.1Vendor Advisory
- http://core.trac.wordpress.org/changeset/25322PatchVendor Advisory
- http://wordpress.org/news/2013/09/wordpress-3-6-1/PatchVendor Advisory
- http://www.debian.org/security/2013/dsa-2757
FAQ
What is CVE-2013-5738?
CVE-2013-5738 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The get_allowed_mime_types function in wp-includes/functions.php in WordPress before 3.6.1 does not require the unfiltered_html capability for uploads of .htm and .html files, which might make it easi...
How severe is CVE-2013-5738?
CVE-2013-5738 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-5738?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.