Lucene search

K
vulnrichmentWPScanVULNRICHMENT:CVE-2024-3921
HistoryMay 29, 2024 - 6:00 a.m.

CVE-2024-3921 Gianism <= 5.1.0 - Admin+ Stored XSS

2024-05-2906:00:02
WPScan
github.com
2
cve-2024-3921
admin privilege
stored xss
wordpress plugin

AI Score

5.4

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

The Gianism WordPress plugin through 5.1.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:gianism:gianism:*:*:*:*:*:*:*:*"
    ],
    "vendor": "gianism",
    "product": "gianism",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "semver",
        "lessThanOrEqual": "5.1.0"
      }
    ],
    "defaultStatus": "affected"
  }
]

AI Score

5.4

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-3921