[Git][security-tracker-team/security-tracker][master] update wordpress metadata
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Dec 9 22:55:41 GMT 2025
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
87a57d57 by Moritz Mühlenhoff at 2025-12-09T23:55:05+01:00
update wordpress metadata
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -25512,6 +25512,7 @@ CVE-2025-58674 (Improper Neutralization of Input During Web Page Generation ('Cr
{DLA-4358-1}
- wordpress 6.8.3+dfsg1-1 (bug #1117047)
NOTE: https://wordpress.org/news/2025/09/wordpress-6-8-3-release/
+ NOTE: https://wordpress.org/documentation/wordpress-version/version-6-1-9/
CVE-2025-58473 (An improper resource shutdown or release vulnerability has been identi ...)
NOT-FOR-US: Click Plus devices
CVE-2025-58354 (Kata Containers is an open source project focusing on a standard imple ...)
@@ -25524,6 +25525,7 @@ CVE-2025-58246 (Insertion of Sensitive Information Into Sent Data vulnerability
{DLA-4358-1}
- wordpress 6.8.3+dfsg1-1 (bug #1117047)
NOTE: https://wordpress.org/news/2025/09/wordpress-6-8-3-release/
+ NOTE: https://wordpress.org/documentation/wordpress-version/version-6-1-9/
CVE-2025-58069 (The use of a hard-coded cryptographic key was discovered in firmware v ...)
NOT-FOR-US: Click Plus PLC
CVE-2025-57882 (An improper resource shutdown or release vulnerability has been identi ...)
@@ -47610,9 +47612,9 @@ CVE-2025-7344 (The EAI developed by Digiwin has a Privilege Escalation vulnerabi
CVE-2025-7343 (The SFT developed by Digiwin has a SQL Injection vulnerability, allowi ...)
NOT-FOR-US: Digiwin
CVE-2025-54352 (WordPress 3.5 through 6.8.2 allows remote attackers to guess titles of ...)
- - wordpress <unfixed> (bug #1109678)
- [bullseye] - wordpress <postponed> (Minor issue, minor infoleak, no upstream response, workarounds exist)
+ - wordpress <unfixed> (unimportant; bug #1109678)
NOTE: https://www.imperva.com/blog/beware-a-threat-actor-could-steal-the-titles-of-your-private-and-draft-wordpress-posts/
+ NOTE: Negligible security impact
CVE-2025-54319 (An issue was discovered in Westermo WeOS 5 (5.24 through 5.24.4). A th ...)
NOT-FOR-US: Westermo WeOS
CVE-2025-53771 (Improper authentication in Microsoft Office SharePoint allows an unaut ...)
@@ -162463,6 +162465,7 @@ CVE-2024-6307 (WordPress Core is vulnerable to Stored Cross-Site Scripting via t
{DLA-4358-1}
- wordpress 6.5.5+dfsg1-1 (bug #1074486)
NOTE: https://wordpress.org/news/2024/06/wordpress-6-5-5/
+ NOTE: https://wordpress.org/documentation/wordpress-version/version-6-1-7/
NOTE: https://core.trac.wordpress.org/changeset/58473
NOTE: https://core.trac.wordpress.org/changeset/58472
CVE-2024-6306
@@ -162572,6 +162575,7 @@ CVE-2024-31111 (Improper Neutralization of Input During Web Page Generation (XSS
{DLA-4358-1}
- wordpress 6.5.5+dfsg1-1 (bug #1074486)
NOTE: https://wordpress.org/news/2024/06/wordpress-6-5-5/
+ NOTE: https://wordpress.org/documentation/wordpress-version/version-6-1-7/
CVE-2024-28832 (Stored XSS in the Crash Report page in Checkmk before versions 2.3.0p7 ...)
- check-mk <removed>
CVE-2024-28831 (Stored XSS in some confirmation pop-ups in Checkmk before versions 2.3 ...)
@@ -187598,6 +187602,7 @@ CVE-2024-4439 (WordPress Core is vulnerable to Stored Cross-Site Scripting via u
[bullseye] - wordpress <not-affected> (The vulnerable code was introduced later)
NOTE: https://wpscan.com/blog/unauthenticated-stored-xss-fixed-in-wordpress-core/
NOTE: https://wordpress.org/news/2024/04/wordpress-6-5-2-maintenance-and-security-release/
+ NOTE: https://wordpress.org/documentation/wordpress-version/version-6-1-6/
NOTE: https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=57950%40%2F&new=57950%40%2F&sfp_email=&sfph_mail=#file3
NOTE: https://core.trac.wordpress.org/changeset/57951/branches/6.4/src/wp-includes/blocks/avatar.php
CVE-2024-3302 (There was no limit to the number of HTTP/2 CONTINUATION frames that wo ...)
@@ -191023,6 +191028,7 @@ CVE-2023-6522 (Incorrect Use of Privileged APIs vulnerability in ExtremePacs Ext
NOT-FOR-US: ExtremePacs Extreme XDS
CVE-2023-5692 (WordPress Core is vulnerable to Sensitive Information Exposure in vers ...)
- wordpress 6.5+dfsg1-1
+ [bookworm] - wordpress <ignored> (Minor issue)
[bullseye] - wordpress <ignored> (Minor issue)
NOTE: https://core.trac.wordpress.org/changeset/57645
CVE-2023-49965 (SpaceX Starlink Wi-Fi router Gen 2 before 2023.48.0 allows XSS via the ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/87a57d57084c59183e533a18ba8465a3da354ac9
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/87a57d57084c59183e533a18ba8465a3da354ac9
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251209/02fba3e8/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list