Input validation vulnerability in WordPress 6.3.1

WordPress has identified a security vulnerability in versions 5.9 to 6.3.1 that allows malicious attackers with contributor-level privileges or higher to inject malicious scripts into pages that will execute when a user accesses them. This vulnerability is caused by a lack of input sanitization and output escaping when using arrow navigation block attributes. It is important for users of WordPress Core 5.9 to 6.3.1 to update their software as soon as possible to prevent malicious attackers from exploiting this vulnerability.

Detected in:

Gutenberg fixed vulnerable versions: >= * <= 16.8.0
WordPress fixed vulnerable versions: >= 5.9 <= 5.9.7

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.