The TCBD Popover plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tcbd-popover-image ' shortcode in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Dec 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 14 Dec 2024 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The TCBD Popover plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tcbd-popover-image ' shortcode in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | |
| Title | TCBD Popover <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-12-14T04:23:40.894Z
Updated: 2024-12-16T20:06:38.141Z
Reserved: 2024-11-26T14:38:44.910Z
Link: CVE-2024-11751
Updated: 2024-12-16T19:39:35.914Z
Status : Received
Published: 2024-12-14T05:15:06.923
Modified: 2024-12-14T05:15:06.923
Link: CVE-2024-11751
No data.