U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-16788

Change History

CVE Modified by MITRE 3/11/2020 6:25:29 PM

Action Type Old Value New Value
Removed CVSS V3.1
GitHub, Inc. AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

								
						
Removed CWE
GitHub, Inc. CWE-79

								
						
Changed Description
In WordPress versions from 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. Automatic updates are enabled by default for minor releases and we strongly recommend that you keep them enabled.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-20043. Reason: This candidate is a duplicate of CVE-2019-20043. Notes: All CVE users should reference CVE-2019-20043 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Removed Reference
https://github.com/WordPress/wordpress-develop/commit/1d1d5be7aa94608c04516cac4238e8c22b93c1d9 [Patch, Third Party Advisory]

								
						
Removed Reference
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-g7rg-hchx-c2gw [Third Party Advisory]

								
						
Removed Reference
https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/ [Vendor Advisory]

								
						
Removed Reference
https://wpvulndb.com/vulnerabilities/9973 [Third Party Advisory]