Search for vulnerabilities
| Vulnerability ID | VCID-2jgs-b7r7-zygv |
| Aliases |
CVE-2020-11030
|
| Summary | In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33). |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 0.0 |
| Risk | None |
| Affected and Fixed Packages | Package Details |
| There are no known CWE. |
| System | Score | Found at |
|---|---|---|
| epss | 0.01037 | https://api.first.org/data/v1/epss?cve=CVE-2020-11030 |
| epss | 0.01037 | https://api.first.org/data/v1/epss?cve=CVE-2020-11030 |
| epss | 0.01037 | https://api.first.org/data/v1/epss?cve=CVE-2020-11030 |
| epss | 0.01037 | https://api.first.org/data/v1/epss?cve=CVE-2020-11030 |
| epss | 0.01037 | https://api.first.org/data/v1/epss?cve=CVE-2020-11030 |
| epss | 0.01037 | https://api.first.org/data/v1/epss?cve=CVE-2020-11030 |
| epss | 0.01037 | https://api.first.org/data/v1/epss?cve=CVE-2020-11030 |
| epss | 0.01037 | https://api.first.org/data/v1/epss?cve=CVE-2020-11030 |
| epss | 0.01037 | https://api.first.org/data/v1/epss?cve=CVE-2020-11030 |
| epss | 0.01037 | https://api.first.org/data/v1/epss?cve=CVE-2020-11030 |
| Percentile | 0.77343 |
| EPSS Score | 0.01037 |
| Published At | April 1, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T16:34:01.034189+00:00 | Debian Oval Importer | Import | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 38.0.0 |