Reflected Cross-Site Scripting Vulnerability in GiveWP WordPress Plugin
CVE-2024-11921
Key Information:
- Vendor
- GiveWP
- Status
- GiveWP
- Vendor
- CVE Published:
- 27 December 2024
Badges
Summary
The GiveWP WordPress plugin, prior to version 3.19.0, contains a vulnerability where it fails to properly sanitize and escape a user-supplied parameter before reflecting it back in the page output. This oversight can lead to a reflected cross-site scripting (XSS) attack, making it possible for attackers to execute malicious scripts in the context of high privilege users, such as administrators. Such an exploit could enable unauthorized access, data manipulation, or other malicious activities, emphasizing the need for users to update their installations promptly to mitigate this risk.
Affected Version(s)
GiveWP 0 < 3.19.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved