Lucene search

K
cveWPScanCVE-2024-4977
HistoryJul 13, 2024 - 6:15 a.m.

CVE-2024-4977

2024-07-1306:15:03
WPScan
web.nvd.nist.gov
25
index wp mysql for speed
wordpress plugin
reflected cross-site scripting
high privilege users
admin

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L

AI Score

5.8

Confidence

High

EPSS

0

Percentile

9.3%

The Index WP MySQL For Speed WordPress plugin before 1.4.18 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

Affected configurations

Vulners
Vulnrichment
Node
fastwpspeedfast_wp_speedRange<1.4.18wordpress
VendorProductVersionCPE
fastwpspeedfast_wp_speed*cpe:2.3:a:fastwpspeed:fast_wp_speed:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "Index WP MySQL For Speed",
    "versions": [
      {
        "status": "affected",
        "versionType": "semver",
        "version": "0",
        "lessThan": "1.4.18"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L

AI Score

5.8

Confidence

High

EPSS

0

Percentile

9.3%

Related for CVE-2024-4977