Cyber Posture

CVE-2024-13329

HighPublic PoC

Published: 04 February 2025

Published
04 February 2025
Modified
07 May 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0015 34.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

The Solidres WordPress plugin through 0.9.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

Security Summary

CVE-2024-13329 is a reflected cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting the Solidres WordPress plugin in versions through 0.9.4. The plugin fails to sanitize and escape a parameter before outputting it back in the page, enabling malicious script injection. It carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility and potential scope change.

Unauthenticated attackers can exploit this vulnerability remotely with low attack complexity, though it requires user interaction, such as a victim clicking a malicious link or visiting a crafted page. The issue targets high-privilege users like administrators, allowing attackers to execute arbitrary JavaScript in the victim's browser context upon successful exploitation. This can result in low-level impacts on confidentiality, integrity, and availability, such as session hijacking or data theft within the user's session.

The WPScan advisories at https://wpscan.com/vulnerability/f923e557-dc3c-43b7-9545-9e92751c9783/ provide further details on the vulnerability, including identification and affected versions.

Details

CWE(s)
CWE-79

Affected Products

solidres
solidres
≤ 0.9.4

References