Description
Cross-site scripting (XSS) vulnerability in wp-includes/wp-db.php in WordPress before 4.2.1 allows remote attackers to inject arbitrary web script or HTML via a long comment that is improperly stored because of limitations on the MySQL TEXT data type.
Exploits (1)
References (15)
Core 15
Core References
Exploit exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/36844/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157391.html
Product x_refsource_confirm
http://codex.wordpress.org/Version_4.2.1
Exploit x_refsource_misc
https://klikki.fi/adv/wordpress2.html
Third Party Advisory x_refsource_misc
https://wpvulndb.com/vulnerabilities/7945
Patch, Vendor Advisory x_refsource_confirm
https://wordpress.org/news/2015/04/wordpress-4-2-1/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158278.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/74334
Exploit mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/Apr/84
Product x_refsource_confirm
https://core.trac.wordpress.org/changeset/32299
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/show/osvdb/121320
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1032199
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2015/dsa-3250
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158271.html
Exploit x_refsource_misc
http://packetstormsecurity.com/files/131644/WordPress-4.2-Cross-Site-Scripting.html
Scores
EPSS
0.1439
EPSS Percentile
94.5%
Details
CWE
CWE-79
Status
published
Products (3)
debian/debian_linux
7.0
debian/debian_linux
8.0
wordpress/wordpress
< 4.2
Published
Aug 03, 2015
Tracked Since
Feb 18, 2026