CVE-2024-13329
Published: 04 February 2025
Description
The Solidres WordPress plugin through 0.9.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Security Summary
CVE-2024-13329 is a reflected cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting the Solidres WordPress plugin in versions through 0.9.4. The plugin fails to sanitize and escape a parameter before outputting it back in the page, enabling malicious script injection. It carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility and potential scope change.
Unauthenticated attackers can exploit this vulnerability remotely with low attack complexity, though it requires user interaction, such as a victim clicking a malicious link or visiting a crafted page. The issue targets high-privilege users like administrators, allowing attackers to execute arbitrary JavaScript in the victim's browser context upon successful exploitation. This can result in low-level impacts on confidentiality, integrity, and availability, such as session hijacking or data theft within the user's session.
The WPScan advisories at https://wpscan.com/vulnerability/f923e557-dc3c-43b7-9545-9e92751c9783/ provide further details on the vulnerability, including identification and affected versions.
Details
- CWE(s)