The TCBD Auto Refresher plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tcbd_auto_refresh' shortcode in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
Mon, 13 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 11 Jan 2025 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The TCBD Auto Refresher plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tcbd_auto_refresh' shortcode in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | |
| Title | TCBD Auto Refresher <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-01-11T07:21:51.888Z
Updated: 2025-01-13T17:16:09.532Z
Reserved: 2024-12-11T13:46:54.073Z
Link: CVE-2024-12519
Updated: 2025-01-13T17:16:01.089Z
Status : Received
Published: 2025-01-11T08:15:25.530
Modified: 2025-01-11T08:15:25.530
Link: CVE-2024-12519
No data.