The Nextend Social Login and Register plugin for WordPress is vulnerable to a self-based Reflected Cross-Site Scripting via the ‘error_description’ parameter in all versions up to, and including, 3.1.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers, with access to a subscriber-level account, to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: This vulnerability can be successfully exploited on a vulnerable WordPress instance against an OAuth pre-authenticated higher-level user (e.g., administrator) by leveraging a cross-site request forgery in conjunction with a certain social engineering technique to achieve a critical impact scenario (cross-site scripting to administrator-level account creation). However, successful exploitation requires "Debug mode" to be enabled in the plugin's "Global Settings".
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 16 Jan 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Nextendweb
Nextendweb nextend Social Login
Weaknesses CWE-79
CPEs cpe:2.3:a:nextendweb:nextend_social_login:*:*:*:*:*:wordpress:*:*
Vendors & Products Nextendweb
Nextendweb nextend Social Login

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T18:48:22.025Z

Reserved: 2024-02-22T18:32:03.150Z

Link: CVE-2024-1775

cve-icon Vulnrichment

Updated: 2024-08-01T18:48:22.025Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-02T08:15:06.257

Modified: 2025-01-16T18:39:46.423

Link: CVE-2024-1775

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.