CVE-2020-28039: WordPress vulnerability

is_protected_meta in wp-includes/meta.php in WordPress before 5.5.2 allows arbitrary file deletion because it does not properly determine whether a meta key is considered protected.

How to mitigate CVE-2020-28039

Time needed: 5 minutes.

Follow the instructions, as they will assist you in mitigating the WordPress vulnerability that been reported in CVE-2020-28039.

  1. Install the latest version of WordPress

    Navigate to the official WordPress website and download the latest version of WordPress. The latest version contains the CVE-2020-28039 fix.
    Update to the latest version

  2. Perform a vulnerability assessment

    Perform a scan on your WordPress environment(s), and check for vulnerabilities. Verify if CVE-2020-28039 has been mitigated.

  3. Utilize the references

    The CVE-2020-28039 references have been provided for a reason. Utilize these references and make sure that you are correctly informed.

References

  • www.debian.org/security/2020/dsa-4784
  • github.com/WordPress/wordpress-develop/commit/d5ddd6d4be1bc9fd16b7796842e6fb26315705ad
  • wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
  • wpscan.com/vulnerability/10452
  • lists.debian.org/debian-lts-announce/2020/11/msg00004.html
  • Share this information