Stored Cross-Site Scripting Vulnerability in WordPress GDPR Plugin Could Trigger Arbitrary Code Execution
CVE-2024-10388
6.1MEDIUM
Summary
The WordPress GDPR plugin is susceptible to stored cross-site scripting due to inadequate input sanitization and output escaping for the 'gdpr_firstname' and 'gdpr_lastname' parameters. This vulnerability allows unauthenticated attackers to inject malicious web scripts into pages. When users access these compromised pages, the injected scripts can execute, potentially leading to unauthorized actions or data exposure. This issue affects all versions of the WordPress GDPR plugin up to and including 2.0.2, highlighting the critical need for users to apply necessary updates and maintain secure coding practices.
Affected Version(s)
WordPress GDPR * <= 2.0.2
References
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
István Márton