The Pods WordPress plugin before 3.2.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
History

Wed, 06 Nov 2024 18:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Tue, 05 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Podsfoundation
Podsfoundation pods
CPEs cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*
Vendors & Products Podsfoundation
Podsfoundation pods
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 05 Nov 2024 06:15:00 +0000

Type Values Removed Values Added
Description The Pods WordPress plugin before 3.2.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Title Pods < 3.2.7.1 - Admin+ Stored XSS
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2024-11-05T06:00:08.587Z

Updated: 2024-11-05T15:42:43.505Z

Reserved: 2024-10-11T18:56:34.906Z

Link: CVE-2024-9883

cve-icon Vulnrichment

Updated: 2024-11-05T15:36:25.685Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-05T06:15:06.430

Modified: 2024-11-06T17:32:17.477

Link: CVE-2024-9883

cve-icon Redhat

No data.