Lucene search

K
vulnrichmentWPScanVULNRICHMENT:CVE-2024-5170
HistorySep 17, 2024 - 6:00 a.m.

CVE-2024-5170 Logo Manager For Enamad <= 0.7.1 - Admin+ Stored XSS via Widget

2024-09-1706:00:02
WPScan
github.com
cve-2024-5170
logo manager
enamad
stored xss
widget
wordpress plugin
high privilege user
admin
cross-site scripting
unfiltered html
multisite setup

EPSS

0

Percentile

14.7%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

The Logo Manager For Enamad WordPress plugin through 0.7.1 does not sanitise and escape in its widgets settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:logo_manager_for_enamad:logo_manager_for_enamad:0.7.0:*:*:*:*:*:*:*"
    ],
    "vendor": "logo_manager_for_enamad",
    "product": "logo_manager_for_enamad",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "semver",
        "lessThanOrEqual": "0.7.1"
      }
    ],
    "defaultStatus": "unknown"
  }
]

EPSS

0

Percentile

14.7%

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-5170