The WC1C plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.23.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Jan 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WC1C plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.23.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | |
Title | WC1C <= 0.23.0 - Reflected Cross-Site Scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-01-07T04:21:59.394Z
Updated: 2025-01-07T16:23:59.603Z
Reserved: 2024-11-18T19:36:53.180Z
Link: CVE-2024-11375
Vulnrichment
Updated: 2025-01-07T15:54:21.537Z
NVD
Status : Received
Published: 2025-01-07T05:15:11.907
Modified: 2025-01-07T05:15:11.907
Link: CVE-2024-11375
Redhat
No data.