Lucene search

K
cveWPScanCVE-2024-5151
HistoryJul 13, 2024 - 6:15 a.m.

CVE-2024-5151

2024-07-1306:15:04
WPScan
web.nvd.nist.gov
29
sully wordpress plugin
stored cross-site scripting
cross-site scripting
high privilege users
admin
unfiltered_html capability
multisite setup

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

AI Score

5.4

Confidence

High

EPSS

0

Percentile

9.3%

The SULly WordPress plugin before 4.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

Affected configurations

Vulners
Vulnrichment
Node
sullyRange<4.3.1wordpress
VendorProductVersionCPE
*sully*cpe:2.3:a:*:sully:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "SULly",
    "versions": [
      {
        "status": "affected",
        "versionType": "semver",
        "version": "0",
        "lessThan": "4.3.1"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

7.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

AI Score

5.4

Confidence

High

EPSS

0

Percentile

9.3%

Related for CVE-2024-5151