Stored Cross-Site Scripting Vulnerability in Gravity Forms Plugin for WordPress
CVE-2024-13378
5.4MEDIUM
Summary
The Gravity Forms plugin for WordPress has a vulnerability that exposes it to Stored Cross-Site Scripting through the 'style_settings' parameter. This issue arises in versions 2.9.0.1 to 2.9.1.3 due to inadequate input sanitization and output escaping procedures. Attackers can exploit this flaw to inject arbitrary JavaScript into web pages, executing scripts when unsuspecting users access a compromised page. Currently, the exploit is primarily effective in the Chrome web browser and requires users to directly navigate to specific media files through attachment posts.
Affected Version(s)
Gravity Forms 2.9.0.1 <= 2.9.1.3
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Michael Mazzolini