Description
WordPress is prone to a prototype pollution vulnerability. Exploiting this issue could allow an attacker to inject key/value �properties� into JavaScript objects, potentially allowing for execution of arbitrary JavaScript in a user�s session if they can trick that user into clicking a link. WordPress versions 4.6.x ranging from 4.6 and up to (and including) 4.6.22 are vulnerable.
Remediation
Update to WordPress version 4.6.23 or latest
References
https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md
https://wordpress.org/support/wordpress-version/version-4.6.23/
Related Vulnerabilities
WordPress Plugin Are You a Human-The Fun Spam Blocker Cross-Site Scripting (1.4.32)
Liferay Portal Incorrect Default Permissions Vulnerability (CVE-2021-33324)
Jboss EAP Inadequate Encryption Strength Vulnerability (CVE-2019-14887)
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-4850)
WordPress Plugin Recent Backups Arbitrary File Download (0.7)