The Starbox WordPress plugin before 3.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Metrics
Affected Vendors & Products
References
History
Tue, 10 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Squirrly
Squirrly starbox |
|
CPEs | cpe:2.3:a:squirrly:starbox:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Squirrly
Squirrly starbox |
|
Metrics |
cvssV3_1
|
Tue, 10 Sep 2024 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Starbox WordPress plugin before 3.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | |
Title | Starbox < 3.5.2 - Admin+ Stored XSS | |
References |
|
MITRE
Status: PUBLISHED
Assigner: WPScan
Published: 2024-09-10T06:00:02.205Z
Updated: 2024-09-10T15:04:36.519Z
Reserved: 2024-08-19T18:24:20.388Z
Link: CVE-2024-7955
Vulnrichment
Updated: 2024-09-10T15:04:30.948Z
NVD
Status : Awaiting Analysis
Published: 2024-09-10T06:15:02.730
Modified: 2024-09-10T15:35:13.013
Link: CVE-2024-7955
Redhat
No data.