CVE-2015-3440

WordPress <4.2.1 - XSS

Title source: llm
STIX 2.1

Description

Cross-site scripting (XSS) vulnerability in wp-includes/wp-db.php in WordPress before 4.2.1 allows remote attackers to inject arbitrary web script or HTML via a long comment that is improperly stored because of limitations on the MySQL TEXT data type.

Exploits (1)

exploitdb WRITEUP VERIFIED
by klikki · textwebappsphp
https://www.exploit-db.com/exploits/36844

References (15)

Core 15
Core References
Exploit exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/36844/
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157391.html
Product x_refsource_confirm
http://codex.wordpress.org/Version_4.2.1
Exploit x_refsource_misc
https://klikki.fi/adv/wordpress2.html
Third Party Advisory x_refsource_misc
https://wpvulndb.com/vulnerabilities/7945
Patch, Vendor Advisory x_refsource_confirm
https://wordpress.org/news/2015/04/wordpress-4-2-1/
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158278.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/74334
Exploit mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/Apr/84
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/show/osvdb/121320
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1032199
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2015/dsa-3250
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158271.html

Scores

EPSS 0.1439
EPSS Percentile 94.5%

Details

CWE
CWE-79
Status published
Products (3)
debian/debian_linux 7.0
debian/debian_linux 8.0
wordpress/wordpress < 4.2
Published Aug 03, 2015
Tracked Since Feb 18, 2026