The float block WordPress plugin through 1.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
History

Fri, 27 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Dec 2024 06:15:00 +0000

Type Values Removed Values Added
Description The float block WordPress plugin through 1.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Title Float Block <= 1.7 - Admin+ Stored XSS via Widget
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2024-12-27T06:00:13.190Z

Updated: 2024-12-27T18:27:44.874Z

Reserved: 2024-11-23T14:58:09.947Z

Link: CVE-2024-11645

cve-icon Vulnrichment

Updated: 2024-12-27T18:27:40.505Z

cve-icon NVD

Status : Received

Published: 2024-12-27T06:15:23.157

Modified: 2024-12-27T19:15:07.557

Link: CVE-2024-11645

cve-icon Redhat

No data.