Description
In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.
References (10)
Core 10
Core References
Release Notes, Third Party Advisory x_refsource_misc
https://wpvulndb.com/vulnerabilities/9975
Release Notes, Vendor Advisory x_refsource_misc
https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/
Patch x_refsource_misc
https://core.trac.wordpress.org/changeset/46894/trunk
Patch x_refsource_misc
https://github.com/WordPress/wordpress-develop/commit/1f7f3f1f59567e2504f0fbebd51ccf004b3ccb1d
Not Applicable x_refsource_misc
https://blog.ripstech.com/filter/vulnerabilities/
Mailing List, Third Party Advisory mailing-list
x_refsource_bugtraq
https://seclists.org/bugtraq/2020/Jan/8
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2020/dsa-4599
Third Party Advisory x_refsource_confirm
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-xvg2-m2f4-83m7
Third Party Advisory x_refsource_misc
https://hackerone.com/reports/509930
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2020/dsa-4677
Scores
CVSS v3
6.1
EPSS
0.0505
EPSS Percentile
89.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (3)
debian/debian_linux
9.0
debian/debian_linux
10.0
wordpress/wordpress
3.7 - 5.3.1
Published
Dec 27, 2019
Tracked Since
Feb 18, 2026