Description
WordPress is prone to a prototype pollution vulnerability. Exploiting this issue could allow an attacker to inject key/value �properties� into JavaScript objects, potentially allowing for execution of arbitrary JavaScript in a user�s session if they can trick that user into clicking a link. WordPress versions 4.7.x ranging from 4.7 and up to (and including) 4.7.22 are vulnerable.
Remediation
Update to WordPress version 4.7.23 or latest
References
https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md
https://wordpress.org/support/wordpress-version/version-4.7.23/
Related Vulnerabilities
Vanilla Forums Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2018-15833)
WordPress Plugin SMS Alert Order Notifications-WooCommerce Cross-Site Scripting (3.4.6)
WordPress Plugin W3 Total Cache PHP Code Injection (0.9.2.8)
WebLogic Uncontrolled Resource Consumption Vulnerability (CVE-2016-8610)
PrestaShop Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2018-20717)