CVE-2018-20151

Priority
Description
In WordPress before 4.9.9 and 5.x before 5.0.1, the user-activation page
could be read by a search engine's web crawler if an unusual configuration
were chosen. The search engine could then index and display a user's e-mail
address and (rarely) the password that was generated by default.
Notes
Package
Upstream:released (CVE-2018-20151)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 20.04 LTS (Focal Fossa):not-affected (CVE-2018-20151)
Ubuntu 20.10 (Groovy Gorilla):not-affected (CVE-2018-20151)
More Information

Updated: 2020-09-09 22:07:08 UTC (commit b67d7d8b03f173f825cd706df5bd078bca500b0e)