Reflected Cross-Site Scripting in TransFinanz WordPress Plugin
CVE-2024-13332
Key Information:
- Vendor
- WordPress
- Status
- Vendor
- CVE Published:
- 4 February 2025
Badges
Summary
The TransFinanz WordPress plugin, up to version 1.0.0, contains a vulnerability that permits Reflected Cross-Site Scripting due to improper sanitization and escaping of parameters. This flaw allows attackers to inject malicious scripts that could execute in the context of users’ browsers, particularly affecting high privilege users such as admins. By leveraging this vulnerability, an attacker could exploit it to gain unauthorized access or perform actions on behalf of the affected users.
Affected Version(s)
TransFinanz 0 <= 1.0.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved