Stored Cross-Site Scripting Vulnerability in WordPress GDPR Plugin Could Trigger Arbitrary Code Execution
CVE-2024-10388

6.1MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
19 November 2024

Summary

The WordPress GDPR plugin is susceptible to stored cross-site scripting due to inadequate input sanitization and output escaping for the 'gdpr_firstname' and 'gdpr_lastname' parameters. This vulnerability allows unauthenticated attackers to inject malicious web scripts into pages. When users access these compromised pages, the injected scripts can execute, potentially leading to unauthorized actions or data exposure. This issue affects all versions of the WordPress GDPR plugin up to and including 2.0.2, highlighting the critical need for users to apply necessary updates and maintain secure coding practices.

Affected Version(s)

WordPress GDPR * <= 2.0.2

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

István Márton
.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.