In WordPress before 4.9.9 and 5.x before 5.0.1, when the Apache HTTP Server is used, authors could upload crafted files that bypass intended MIME type restrictions, leading to XSS, as demonstrated by a .jpg file without JPEG data.
https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/
https://www.debian.org/security/2019/dsa-4401
https://lists.debian.org/debian-lts-announce/2019/02/msg00019.html
https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a
http://www.securityfocus.com/bid/106220
https://wpvulndb.com/vulnerabilities/9175
https://wordpress.org/support/wordpress-version/version-5-0-1/
https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/
https://codex.wordpress.org/Version_4.9.9
Source: Mitre, NVD
Published: 2018-12-14
Updated: 2024-11-21
Base Score: 3.5
Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N
Severity: Low
Base Score: 5.4
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Severity: Medium
EPSS: 0.04032