Reflected Cross-Site Scripting Vulnerability in ResAds Plugin for WordPress
CVE-2024-12122
6.1MEDIUM
Summary
The ResAds plugin for WordPress suffers from a Reflected Cross-Site Scripting vulnerability due to inadequate input sanitization and output escaping mechanisms. This flaw allows unauthenticated attackers to inject malicious web scripts through various parameters. If a victim is deceived into triggering an action—such as clicking a crafted link—the injected scripts will execute within their browser context, potentially compromising sensitive user information or facilitating further attacks. All versions of the ResAds plugin up to and including 2.0.6 are affected, necessitating prompt attention to mitigate the associated risks.
Affected Version(s)
ResAds * <= 2.0.6
References
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Dale Mavers