Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-532z-9qbb-dyfw Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it. This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30. CVE-2025-58246
VCID-zj9a-shru-e7gs Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordPress allows Stored XSS. WordPress core security team is aware of the issue and working on a fix. This is low severity vulnerability that requires an attacker to have Author or higher user privileges to execute the attack vector.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30. CVE-2025-58674

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:58:58.088805+00:00 Debian Importer Fixing VCID-532z-9qbb-dyfw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:45.316722+00:00 Debian Importer Fixing VCID-zj9a-shru-e7gs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:55:09.948843+00:00 Debian Importer Fixing VCID-532z-9qbb-dyfw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:58.219639+00:00 Debian Importer Fixing VCID-zj9a-shru-e7gs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:58:01.657841+00:00 Debian Importer Fixing VCID-zj9a-shru-e7gs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:58:01.600792+00:00 Debian Importer Fixing VCID-532z-9qbb-dyfw https://security-tracker.debian.org/tracker/data/json 38.1.0