Vulnerability Description
In the api-bearer-auth plugin before 20190907 for WordPress, the server parameter is not correctly filtered in the swagger-config.yaml.php file, and it is possible to inject JavaScript code, aka XSS.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Api Bearer Auth Project | Api Bearer Auth | < 2019-09-07 |
Related Weaknesses (CWE)
References
- https://packetstormsecurity.com/files/154369/WordPress-API-Bearer-Auth-20181229-ExploitThird Party AdvisoryVDB Entry
- https://plugins.trac.wordpress.org/changeset/2152730Third Party Advisory
- https://wordpress.org/plugins/api-bearer-auth/#developersRelease Notes
- https://wpvulndb.com/vulnerabilities/9868Third Party Advisory
- https://packetstormsecurity.com/files/154369/WordPress-API-Bearer-Auth-20181229-ExploitThird Party AdvisoryVDB Entry
- https://plugins.trac.wordpress.org/changeset/2152730Third Party Advisory
- https://wordpress.org/plugins/api-bearer-auth/#developersRelease Notes
- https://wpvulndb.com/vulnerabilities/9868Third Party Advisory
FAQ
What is CVE-2019-16332?
CVE-2019-16332 is a vulnerability with a CVSS score of 6.1 (MEDIUM). In the api-bearer-auth plugin before 20190907 for WordPress, the server parameter is not correctly filtered in the swagger-config.yaml.php file, and it is possible to inject JavaScript code, aka XSS.
How severe is CVE-2019-16332?
CVE-2019-16332 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-16332?
Check the references section above for vendor advisories and patch information. Affected products include: Api Bearer Auth Project Api Bearer Auth.