Browse all 6 CVE security advisories affecting WordPress.org. AI-powered Chinese analysis, POCs, and references for each vulnerability.
WordPress.org powers over 40% of websites as an open-source content management system enabling website creation and management. Historically, it has faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from plugin and theme insecurities. The platform maintains a security team that regularly releases patches, though its extensive plugin ecosystem remains a primary attack vector. In 2021, a critical flaw in a core component allowed unauthenticated attacks, affecting millions of sites. Despite these challenges, WordPress.org's transparency in vulnerability reporting and regular security updates help mitigate risks for its vast user base.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-39999 | WordPress < 6.3.2 is vulnerable to Broken Access Control — WordPressCWE-200 | 4.3 | Medium | 2023-10-13 |
| CVE-2023-38000 | Auth. Stored Cross-Site Scripting (XSS) vulnerability in WordPress core and Gutenberg plugin via Navigation Links Block — WordPressCWE-79 | 6.5 | Medium | 2023-10-13 |
| CVE-2022-43497 | WordPress 跨站脚本漏洞 — WordPress | 6.1 | - | 2022-12-05 |
| CVE-2022-43500 | WordPress 跨站脚本漏洞 — WordPress | 6.1 | - | 2022-12-05 |
| CVE-2022-43504 | WordPress 授权问题漏洞 — WordPress | 5.3 | - | 2022-12-05 |
This page lists every published CVE security advisory associated with WordPress.org. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.