Cross-Site Scripting (XSS) Vulnerability in Starbox WordPress Plugin
CVE-2024-1273

Currently unrated

Key Information:

Vendor
Wordpress
Status
Vendor
CVE Published:
11 March 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

The vulnerability in the Starbox WordPress plugin arises from improper sanitization and escaping of input parameters, which could potentially allow users with minimal permissions, such as a Contributor, to execute Cross-Site Scripting (XSS) attacks. This flaw enables threats such as unauthorized access to sensitive data, modification of web content, and the potential to perform further attacks on users visiting the compromised website.

Affected Version(s)

Starbox 0 < 3.5.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Dmitrii Ignatyev
WPScan
.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.