Lucene search

K
cveWordfenceCVE-2024-2306
HistoryApr 09, 2024 - 7:15 p.m.

CVE-2024-2306

2024-04-0919:15:31
Wordfence
web.nvd.nist.gov
24
cve-2024-2306
cross-site scripting
wordpress
revslider
input sanitization
output escaping
authenticated attackers
arbitrary web scripts
administrators
authors

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

AI Score

5.7

Confidence

High

EPSS

0

Percentile

9.0%

The Revslider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via svg upload in all versions up to, and including, 6.6.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, this can only be exploited by administrators, but the ability to use and configure revslider can be extended to authors.

Affected configurations

Vulners
Node
revolution_sliderslider_revolutionRange6.6.20wordpress
VendorProductVersionCPE
revolution_sliderslider_revolution*cpe:2.3:a:revolution_slider:slider_revolution:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "Revolution Slider",
    "product": "Slider Revolution",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "6.6.20",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

AI Score

5.7

Confidence

High

EPSS

0

Percentile

9.0%