WordPress users with lower privileges (like contributors) can inject
JavaScript code in the block editor using a specific payload, which is
executed within the dashboard. This can lead to XSS if an admin opens the
post in the editor. Execution of this attack does require an authenticated
user. This has been patched in WordPress 5.3.1, along with all the previous
WordPress versions from 3.7 to 5.3 via a minor release. Automatic updates
are enabled by default for minor releases and we strongly recommend that
you keep them enabled.
Upstream:released (5.3.2+dfsg1-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.10 (Eoan Ermine):needs-triage
Ubuntu 20.04 (Focal Fossa):not-affected (5.3.2+dfsg1-1)
More Information

Updated: 2020-01-29 18:59:03 UTC (commit 40f18bf14da5fb50662e1f861ea594a462b207fe)