Lucene search

K
cveWPScanCVE-2024-6651
HistoryAug 06, 2024 - 6:15 a.m.

CVE-2024-6651

2024-08-0606:15:35
WPScan
web.nvd.nist.gov
2
wordpress
file upload
cross-site scripting
parameter sanitization
high privilege users

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

5.8

Confidence

High

EPSS

0

Percentile

9.5%

The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

Affected configurations

Vulners
Vulnrichment
Node
wordpress_file_upload_projectwordpress_file_uploadRange<4.24.8wordpress
VendorProductVersionCPE
wordpress_file_upload_projectwordpress_file_upload*cpe:2.3:a:wordpress_file_upload_project:wordpress_file_upload:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "WordPress File Upload",
    "versions": [
      {
        "status": "affected",
        "versionType": "semver",
        "version": "0",
        "lessThan": "4.24.8"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

5.8

Confidence

High

EPSS

0

Percentile

9.5%

Related for CVE-2024-6651