The AWeber WordPress plugin through 7.3.20 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Metrics
Affected Vendors & Products
References
History
Tue, 10 Jun 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aweber
Aweber aweber |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:aweber:aweber:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Aweber
Aweber aweber |
Tue, 20 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 15 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The AWeber WordPress plugin through 7.3.20 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | |
| Title | AWeber <= 7.3.20 - Admin+ Stored XSS | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published: 2025-05-15T20:06:59.940Z
Updated: 2025-05-20T19:29:00.191Z
Reserved: 2025-01-09T20:34:16.652Z
Link: CVE-2024-13313
Updated: 2025-05-19T20:30:50.802Z
Status : Analyzed
Published: 2025-05-15T20:15:38.980
Modified: 2025-06-10T12:01:55.290
Link: CVE-2024-13313
No data.