
Cloud Vulnerability DB
A community-led vulnerabilities database
A security vulnerability (CVE-2021-39203) was identified in WordPress 5.8 beta that allowed authenticated users to bypass restrictions in the block editor under certain conditions. The vulnerability was discovered and disclosed on September 9, 2021, affecting WordPress 5.8 beta 1 versions (GitHub Advisory).
The vulnerability is classified as an authorization bypass issue (CWE-863) that could lead to private data disclosure and privilege escalation through the WordPress block editor. The issue was initially categorized under CWE-200 (Information Exposure) but was later refined to be more specifically identified as an authorization bypass vulnerability (NVD Report).
The vulnerability could allow authenticated users without proper permissions to access and view private post types and data that they should not have access to through the block editor (GitHub Advisory).
The vulnerability was addressed and fixed in the final WordPress 5.8 release. Users who were running the beta version were advised to upgrade to the final 5.8 release to mitigate the vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."