Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/wordpress@0?distro=trixie
purl pkg:deb/debian/wordpress@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (18)
Vulnerability Summary Aliases
VCID-1cad-s6nn-j7aw embedded prototype.js JavaScript hijacking CVE-2007-2383
VCID-2amm-jjpz-xyhf wordpress: multiple XSS issues in invite action CVE-2008-1304
VCID-2jta-dshu-e7hb WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions the widgets editor introduced in WordPress 5.8 beta 1 has improper handling of HTML input in the Custom HTML feature. This leads to stored XSS in the custom HTML widget. This has been patched in WordPress 5.8. It was only present during the testing/beta phase of WordPress 5.8. CVE-2021-39202
VCID-3m3b-wxjf-qfg4 Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters. CVE-2008-4671
VCID-5brn-syjs-d3dp Moodle vulnerable to Cross-site Scripting Cross-site scripting (XSS) vulnerability in the fix_non_standard_entities function in the KSES HTML text cleaning library (weblib.php), as used in Moodle 1.8.x before 1.8.12 and 1.9.x before 1.9.8, allows remote attackers to inject arbitrary web script or HTML via crafted HTML entities. CVE-2010-1619
GHSA-hhxf-w8hj-43w6
VCID-6baf-6r3v-gub4 Wordpress contains several cross-site scripting, cross-site request forgery and information leak vulnerabilities. CVE-2007-1409
VCID-7gbk-16zv-j7f9 WordPress before 4.4 makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach. CVE-2014-6412
VCID-96pa-cg28-cbgy Cross-site scripting (XSS) vulnerability in WordPress before 2.6, SVN development versions only, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. CVE-2008-3233
VCID-bubm-v7mg-xkcg WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions authenticated users who don't have permission to view private post types/data can bypass restrictions in the block editor under certain conditions. This affected WordPress 5.8 beta during the testing period. It's fixed in the final 5.8 release. CVE-2021-39203
VCID-c7ej-2svr-uyd3 WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar. CVE-2024-4439
VCID-dv3a-7kct-xqh6 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Automattic WordPress allows Relative Path Traversal.This issue affects WordPress: from 6.5 through 6.5.4, from 6.4 through 6.4.4, from 6.3 through 6.3.4, from 6.2 through 6.2.5, from 6.1 through 6.1.6, from 6.0 through 6.0.8, from 5.9 through 5.9.9, from 5.8 through 5.8.9, from 5.7 through 5.7.11, from 5.6 through 5.6.13, from 5.5 through 5.5.14, from 5.4 through 5.4.15, from 5.3 through 5.3.17, from 5.2 through 5.2.20, from 5.1 through 5.1.18, from 5.0 through 5.0.21, from 4.9 through 4.9.25, from 4.8 through 4.8.24, from 4.7 through 4.7.28, from 4.6 through 4.6.28, from 4.5 through 4.5.31, from 4.4 through 4.4.32, from 4.3 through 4.3.33, from 4.2 through 4.2.37, from 4.1 through 4.1.40. CVE-2024-32111
VCID-j33g-aex7-uke8 The _httpsrequest function in Snoopy 1.2, as used in products such as (1) MagpieRSS, (2) WordPress, (3) Ampache, and (4) Jinzora, allows remote attackers to execute arbitrary commands via shell metacharacters in an HTTPS URL to an SSL protected web page, which is not properly handled by the fetch function. CVE-2005-3330
VCID-j4bb-d6da-w3de Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions. CVE-2023-38000
VCID-jmhr-atwp-5kee WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected. CVE-2024-31211
VCID-pv2z-zrfb-83fy Cross-site scripting (XSS) vulnerability in index.php in the Blue Memories theme 1.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter, possibly a related issue to CVE-2007-2757 and CVE-2007-4014. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. CVE-2007-4165
VCID-s677-mr1w-q3he WordPress 2.1.1, as downloaded from some official distribution sites during February and March 2007, contains an externally introduced backdoor that allows remote attackers to execute arbitrary commands via (1) an eval injection vulnerability in the ix parameter to wp-includes/feed.php, and (2) an untrusted passthru call in the iz parameter to wp-includes/theme.php. CVE-2007-1277
VCID-uwyj-2kgc-zyg6 WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits. CVE-2023-22622
VCID-zf8r-75us-nygf WordPress core is vulnerable to unauthorized access in versions 6.9 through 6.9.1. The Notes feature (block-level collaboration annotations) was introduced in WordPress 6.9 to allow editorial comments directly on posts in the block editor. However, the REST API `create_item_permissions_check()` method in the comments controller did not verify that the authenticated user has `edit_post` permission on the target post when creating a note. This makes it possible for authenticated attackers with Subscriber-level access to create notes on any post, including posts authored by other users, private posts, and posts in any status. CVE-2026-3906

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:18:01.105819+00:00 Debian Importer Fixing VCID-s677-mr1w-q3he https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:08:40.224572+00:00 Debian Importer Fixing VCID-96pa-cg28-cbgy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:03:03.114984+00:00 Debian Importer Fixing VCID-2jta-dshu-e7hb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:55:13.234371+00:00 Debian Importer Fixing VCID-pv2z-zrfb-83fy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:50:00.879302+00:00 Debian Importer Fixing VCID-7gbk-16zv-j7f9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:31:14.389984+00:00 Debian Importer Fixing VCID-j33g-aex7-uke8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:24:36.498243+00:00 Debian Importer Fixing VCID-j4bb-d6da-w3de https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:03:17.572326+00:00 Debian Importer Fixing VCID-6baf-6r3v-gub4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:54:15.568606+00:00 Debian Importer Fixing VCID-1cad-s6nn-j7aw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:42:27.781684+00:00 Debian Importer Fixing VCID-5brn-syjs-d3dp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:08:11.958935+00:00 Debian Importer Fixing VCID-zf8r-75us-nygf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:54:43.775654+00:00 Debian Importer Fixing VCID-2amm-jjpz-xyhf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:44.359304+00:00 Debian Importer Fixing VCID-dv3a-7kct-xqh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:52.187374+00:00 Debian Importer Fixing VCID-c7ej-2svr-uyd3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:02.706945+00:00 Debian Importer Fixing VCID-uwyj-2kgc-zyg6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:14.916667+00:00 Debian Importer Fixing VCID-jmhr-atwp-5kee https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:12.680448+00:00 Debian Importer Fixing VCID-bubm-v7mg-xkcg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:42:17.907478+00:00 Debian Importer Fixing VCID-3m3b-wxjf-qfg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:09:41.780027+00:00 Debian Importer Fixing VCID-s677-mr1w-q3he https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:02:30.435158+00:00 Debian Importer Fixing VCID-96pa-cg28-cbgy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:58:16.892751+00:00 Debian Importer Fixing VCID-2jta-dshu-e7hb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:52:17.477268+00:00 Debian Importer Fixing VCID-pv2z-zrfb-83fy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:48:23.712524+00:00 Debian Importer Fixing VCID-7gbk-16zv-j7f9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:34:23.523750+00:00 Debian Importer Fixing VCID-j33g-aex7-uke8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:37.686006+00:00 Debian Importer Fixing VCID-j4bb-d6da-w3de https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:14:10.783051+00:00 Debian Importer Fixing VCID-6baf-6r3v-gub4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:34.001325+00:00 Debian Importer Fixing VCID-1cad-s6nn-j7aw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:44.196203+00:00 Debian Importer Fixing VCID-5brn-syjs-d3dp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:34:01.484020+00:00 Debian Importer Fixing VCID-zf8r-75us-nygf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:45.948929+00:00 Debian Importer Fixing VCID-2amm-jjpz-xyhf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:05:03.901157+00:00 Debian Importer Fixing VCID-dv3a-7kct-xqh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:16.378409+00:00 Debian Importer Fixing VCID-c7ej-2svr-uyd3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:25.303452+00:00 Debian Importer Fixing VCID-uwyj-2kgc-zyg6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:30.838913+00:00 Debian Importer Fixing VCID-jmhr-atwp-5kee https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:13.078714+00:00 Debian Importer Fixing VCID-bubm-v7mg-xkcg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:59.826812+00:00 Debian Importer Fixing VCID-3m3b-wxjf-qfg4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:58:01.691355+00:00 Debian Importer Fixing VCID-zf8r-75us-nygf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:58:01.454902+00:00 Debian Importer Fixing VCID-c7ej-2svr-uyd3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:58:01.400211+00:00 Debian Importer Fixing VCID-dv3a-7kct-xqh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:58:01.350027+00:00 Debian Importer Fixing VCID-jmhr-atwp-5kee https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:58:01.050060+00:00 Debian Importer Fixing VCID-j4bb-d6da-w3de https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:58:00.933350+00:00 Debian Importer Fixing VCID-uwyj-2kgc-zyg6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:58:00.363174+00:00 Debian Importer Fixing VCID-bubm-v7mg-xkcg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:58:00.321460+00:00 Debian Importer Fixing VCID-2jta-dshu-e7hb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:53.271511+00:00 Debian Importer Fixing VCID-7gbk-16zv-j7f9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:50.173379+00:00 Debian Importer Fixing VCID-5brn-syjs-d3dp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:49.163845+00:00 Debian Importer Fixing VCID-3m3b-wxjf-qfg4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:49.024182+00:00 Debian Importer Fixing VCID-96pa-cg28-cbgy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:48.761415+00:00 Debian Importer Fixing VCID-2amm-jjpz-xyhf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:48.127791+00:00 Debian Importer Fixing VCID-pv2z-zrfb-83fy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:47.618047+00:00 Debian Importer Fixing VCID-1cad-s6nn-j7aw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:47.322294+00:00 Debian Importer Fixing VCID-6baf-6r3v-gub4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:47.282322+00:00 Debian Importer Fixing VCID-s677-mr1w-q3he https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:57:45.970464+00:00 Debian Importer Fixing VCID-j33g-aex7-uke8 https://security-tracker.debian.org/tracker/data/json 38.1.0