Description
WordPress is prone to a prototype pollution vulnerability. Exploiting this issue could allow an attacker to inject key/value �properties� into JavaScript objects, potentially allowing for execution of arbitrary JavaScript in a user�s session if they can trick that user into clicking a link. WordPress versions 4.1.x ranging from 4.1 and up to (and including) 4.1.34 are vulnerable.
Remediation
Update to WordPress version 4.1.35 or latest
References
https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md
https://wordpress.org/support/wordpress-version/version-4-1-35/
Related Vulnerabilities
ATutor Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-11446)
WebLogic Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2021-2351)
WordPress Plugin wpStoreCart 'upload.php' Arbitrary File Upload (2.5.29)
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-6727)
WordPress Plugin UnGallery 'search' Parameter Remote Arbitrary Command Execution (2.1.5)