Lucene search

K
cveWordfenceCVE-2024-3162
HistoryApr 03, 2024 - 3:15 a.m.

CVE-2024-3162

2024-04-0303:15:10
CWE-87
Wordfence
web.nvd.nist.gov
48
wordpress
plugin
stored cross-site scripting
input sanitization
output escaping
nvd

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

AI Score

5.9

Confidence

High

EPSS

0

Percentile

9.0%

The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Testimonial Widget Attributes in all versions up to, and including, 2.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. CVE-2024-32721 is likely a duplicate of this issue.

Affected configurations

Vulners
Node
jegthemejeg_elementor_kitRange2.6.3wordpress
VendorProductVersionCPE
jegthemejeg_elementor_kit*cpe:2.3:a:jegtheme:jeg_elementor_kit:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "jegtheme",
    "product": "Jeg Elementor Kit",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "2.6.3",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

AI Score

5.9

Confidence

High

EPSS

0

Percentile

9.0%