Reflected Cross-Site Scripting Vulnerability in WP Projects Portfolio Plugin by WordPress
CVE-2024-13114
Key Information:
- Vendor
- WordPress
- Vendor
- CVE Published:
- 4 February 2025
Badges
Summary
The WP Projects Portfolio with Client Testimonials plugin for WordPress, version 3.0, contains a vulnerability due to improper sanitization and escaping of parameters. This flaw allows an attacker to inject malicious scripts into the output, potentially targeting high privilege users, including administrators. Exploiting this vulnerability could lead to the execution of arbitrary scripts in the context of a victim's browser session, creating a risk of data theft or unintended actions on behalf of the user.
Affected Version(s)
WP Projects Portfolio with Client Testimonials 0 <= 3.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved