CVE-2021-29450

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-29450
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-29450.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-29450
Aliases
Downstream
Related
  • GHSA-pmmh-2f36-wvhq
Published
2021-04-15T22:15:12.343Z
Modified
2025-11-19T17:34:09.210728Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. This has been patched in WordPress 5.7.1, along with the older affected versions via minor releases. It's strongly recommended that you keep auto-updates enabled to receive the fix.

References

Affected packages

Git / github.com/wordpress/wordpress

Affected ranges

Type
GIT
Repo
https://github.com/wordpress/wordpress
Events

Git / github.com/wordpress/wordpress-develop

Affected ranges

Type
GIT
Repo
https://github.com/wordpress/wordpress-develop
Events