The Beek Widget Extention plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 0.9.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
Fri, 25 Oct 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 25 Oct 2024 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Beek Widget Extention plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 0.9.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | |
Title | Beek Widget Extention <= 0.9.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-25T08:34:40.747Z
Updated: 2024-10-25T15:19:29.130Z
Reserved: 2024-10-24T12:54:02.681Z
Link: CVE-2024-10343
Vulnrichment
Updated: 2024-10-25T15:19:20.639Z
NVD
Status : Awaiting Analysis
Published: 2024-10-25T09:15:04.637
Modified: 2024-10-25T12:56:07.750
Link: CVE-2024-10343
Redhat
No data.