The Simple File List WordPress plugin before 6.1.13 does not sanitise and escape a generated URL before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against admins.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 15 May 2025 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Thu, 14 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Simplefilelist
Simplefilelist simple File List
CPEs cpe:2.3:a:simplefilelist:simple_file_list:*:*:*:*:*:wordpress:*:*
Vendors & Products Simplefilelist
Simplefilelist simple File List
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 Nov 2024 06:15:00 +0000

Type Values Removed Values Added
Description The Simple File List WordPress plugin before 6.1.13 does not sanitise and escape a generated URL before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against admins.
Title Simple File List < 6.1.13 - Reflected Cross-Site Scripting
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2024-11-14T18:50:53.614Z

Reserved: 2024-10-18T18:46:07.928Z

Link: CVE-2024-10146

cve-icon Vulnrichment

Updated: 2024-11-14T18:50:47.659Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-14T06:15:07.080

Modified: 2025-05-15T16:29:19.743

Link: CVE-2024-10146

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.