{"id":"CVE-2019-20041","details":"wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript&colon; substring.","modified":"2026-03-20T11:29:00.915005Z","published":"2019-12-27T08:15:09.683Z","references":[{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4599"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4677"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00010.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2020/Jan/8"},{"type":"ADVISORY","url":"https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/"},{"type":"FIX","url":"https://github.com/WordPress/wordpress-develop/commit/b1975463dd995da19bb40d3fa0786498717e3c53"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wordpress/wordpress","events":[{"introduced":"0"},{"fixed":"378daf04727d8124c3a98e2f801632e068c04964"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.3.1"}]}},{"type":"GIT","repo":"https://github.com/wordpress/wordpress-develop","events":[{"introduced":"0"},{"fixed":"b1975463dd995da19bb40d3fa0786498717e3c53"}]}],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-20041.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}