Description
WordPress is prone to a prototype pollution vulnerability. Exploiting this issue could allow an attacker to inject key/value �properties� into JavaScript objects, potentially allowing for execution of arbitrary JavaScript in a user�s session if they can trick that user into clicking a link. WordPress versions 4.2.x ranging from 4.2 and up to (and including) 4.2.31 are vulnerable.
Remediation
Update to WordPress version 4.2.32 or latest
References
https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md
https://wordpress.org/support/wordpress-version/version-4-2-32/
Related Vulnerabilities
WordPress Plugin User Role by BestWebSoft Cross-Site Scripting (1.5.1)
WordPress Plugin WordPress Download Manager Multiple Security Bypass Vulnerabilities (2.6.92)
Oracle Database Server CVE-2019-2955 Vulnerability (CVE-2019-2955)
Apache 2.x version older than 2.2.10
Ruby on Rails Missing Encryption of Sensitive Data Vulnerability (CVE-2010-3299)