Lucene search

K
vulnrichmentWPScanVULNRICHMENT:CVE-2024-5151
HistoryJul 13, 2024 - 6:00 a.m.

CVE-2024-5151 SULly < 4.3.1 - Admin+ Stored XSS

2024-07-1306:00:09
WPScan
github.com
6
cve-2024-5151
sully
wordpress
plugin
stored xss
admin
cross-site scripting

AI Score

5.7

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

The SULly WordPress plugin before 4.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:toolstack:sully:*:*:*:*:*:*:*:*"
    ],
    "vendor": "toolstack",
    "product": "sully",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "4.3.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

5.7

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-5151