Cyber Posture

CVE-2024-56033

High

Published: 02 January 2025

Published
02 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0017 37.8th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Think201 FAQs faqs allows Reflected XSS.This issue affects FAQs: from n/a through <= 1.0.2.

Security Summary

CVE-2024-56033 is an Improper Neutralization of Input During Web Page Generation vulnerability, enabling Reflected Cross-site Scripting (XSS) as classified under CWE-79. It affects the Think201 FAQs WordPress plugin, with vulnerable versions spanning from an unspecified initial release through 1.0.2. The issue was published on 2025-01-02 and carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).

Attackers can exploit this remotely over the network without authentication or privileges, but it requires user interaction such as clicking a malicious link. A successful Reflected XSS attack injects and executes arbitrary JavaScript in the victim's browser context upon reflection of attacker-controlled input during web page generation. This scope change (S:C) allows limited impacts on confidentiality, integrity, and availability, potentially enabling session hijacking, data theft, or other client-side compromises within the affected site.

The Patchstack advisory (https://patchstack.com/database/Wordpress/Plugin/faqs/vulnerability/wordpress-faqs-plugin-1-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) documents the Reflected XSS vulnerability specifically in WordPress FAQs plugin version 1.0.2. Practitioners should review this reference for detailed mitigation guidance, including any available patches or workarounds from the vendor.

Details

CWE(s)
CWE-79

References