The Post Status Notifier Lite and Premium plugins for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘page’ parameter in all versions up to, and including, 1.11.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 29 Oct 2024 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Post Status Notifier Lite and Premium plugins for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘page’ parameter in all versions up to, and including, 1.11.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | |
Title | Post Status Notifier Lite and Premium <= 1.11.6 - Reflected Cross-Site Scripting via page | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-29T08:31:18.188Z
Updated: 2024-10-29T14:52:54.958Z
Reserved: 2024-10-16T20:06:31.778Z
Link: CVE-2024-10048
Vulnrichment
Updated: 2024-10-29T14:37:37.432Z
NVD
Status : Awaiting Analysis
Published: 2024-10-29T09:15:06.403
Modified: 2024-10-29T14:34:04.427
Link: CVE-2024-10048
Redhat
No data.