MGASA-2015-0290

Source
https://advisories.mageia.org/MGASA-2015-0290.html
Import Source
https://advisories.mageia.org/MGASA-2015-0290.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0290
Related
Published
2015-07-27T18:54:19Z
Modified
2015-07-27T18:44:37Z
Summary
Updated wordpress package fixes security vulnerabilities
Details

WordPress versions 4.2.2 and earlier are affected by a cross-site scripting vulnerability, which could allow users with the Contributor or Author role to compromise a site (CVE-2015-5622).

WordPress versions 4.2.2 and earlier are affected by an issue where it was possible for a user with Subscriber permissions to create a draft through Quick Draft (CVE-2015-5623).

References
Credits

Affected packages

Mageia:4 / wordpress

Package

Name
wordpress
Purl
pkg:rpm/mageia/wordpress?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.9.7-1.mga4

Ecosystem specific

{
    "section": "core"
}