CVE-2024-31211

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-31211
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-31211.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-31211
Aliases
Downstream
Published
2024-04-04T23:00:17.782Z
Modified
2026-01-04T05:43:11.260228Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Remote Code Execution in `WP_HTML_Token`
Details

WordPress is an open publishing platform for the Web. Unserialization of instances of the WP_HTML_Token class allows for code execution via its __destruct() magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.

Database specific
{
    "cwe_ids": [
        "CWE-502"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/31xxx/CVE-2024-31211.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/wordpress/wordpress

Affected ranges

Type
GIT
Repo
https://github.com/wordpress/wordpress
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-31211.json"

Git / github.com/wordpress/wordpress-develop

Affected ranges

Type
GIT
Repo
https://github.com/wordpress/wordpress-develop
Events

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-31211.json"