Description
WordPress is prone to a prototype pollution vulnerability. Exploiting this issue could allow an attacker to inject key/value �properties� into JavaScript objects, potentially allowing for execution of arbitrary JavaScript in a user�s session if they can trick that user into clicking a link. WordPress versions 5.1.x ranging from 5.1 and up to (and including) 5.1.12 are vulnerable.
Remediation
Update to WordPress version 5.1.13 or latest
References
https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md
https://wordpress.org/support/wordpress-version/version-5-1-13/
Related Vulnerabilities
Django Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-0472)
WordPress Plugin CYSTEME Finder, the admin files explorer Unspecified Vulnerability (1.7)
Oracle Application Server CVE-2008-3977 Vulnerability (CVE-2008-3977)
WordPress Plugin Bad Behavior Multiple Vulnerabilities (2.2.18)
WordPress Plugin VikBooking Hotel Booking Engine & PMS Cross-Site Scripting (1.5.8)