Description
WordPress is prone to a prototype pollution vulnerability. Exploiting this issue could allow an attacker to inject key/value �properties� into JavaScript objects, potentially allowing for execution of arbitrary JavaScript in a user�s session if they can trick that user into clicking a link. WordPress versions 5.1.x ranging from 5.1 and up to (and including) 5.1.12 are vulnerable.
Remediation
Update to WordPress version 5.1.13 or latest
References
https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md
https://wordpress.org/support/wordpress-version/version-5-1-13/
Related Vulnerabilities
OpenSSL Use of Insufficiently Random Values Vulnerability (CVE-2019-1549)
WordPress Plugin WordPress Books Gallery Security Bypass (3.5)
WordPress Plugin WordPress Download Manager Cross-Site Scripting (3.2.21)
WordPress Plugin Pay With Tweet SQL Injection and Cross-Site Scripting Vulnerabilities (1.1)
Oracle Database Server CVE-2012-3146 Vulnerability (CVE-2012-3146)