Vulnerability Description
Before version 4.8.2, WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL.
CVSS Score
6.1
MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | <= 4.8.1 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/100912Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039553
- https://core.trac.wordpress.org/changeset/41393PatchVendor Advisory
- https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-relePatchRelease NotesVendor Advisory
- https://www.debian.org/security/2017/dsa-3997
- http://www.securityfocus.com/bid/100912Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039553
- https://core.trac.wordpress.org/changeset/41393PatchVendor Advisory
- https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-relePatchRelease NotesVendor Advisory
- https://www.debian.org/security/2017/dsa-3997
FAQ
What is CVE-2017-14718?
CVE-2017-14718 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Before version 4.8.2, WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL.
How severe is CVE-2017-14718?
CVE-2017-14718 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14718?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.