Stored Cross-Site Scripting Vulnerability in Simply Guest Author Name Plugin for WordPress
CVE-2024-0254
5.4MEDIUM
What is CVE-2024-0254?
The Simply Guest Author Name plugin for WordPress is susceptible to a Stored Cross-Site Scripting vulnerability, stemming from inadequate input sanitization and output escaping on user-supplied attributes in the plugin's post meta. This flaw allows attackers with contributor-level permissions and above to inject malicious web scripts. These scripts can be executed whenever a user views the affected page, potentially compromising user data and site integrity.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
(Simply) Guest Author Name * <= 4.34
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Francesco Carlucci