Reflected Cross-Site Scripting in Post Timeline WordPress Plugin
CVE-2024-13571
Key Information:
- Vendor
- WordPress
- Status
- Vendor
- CVE Published:
- 26 February 2025
Badges
Summary
The Post Timeline plugin for WordPress, prior to version 2.3.10, contains a vulnerability that fails to properly sanitize and escape its input parameters. This oversight permits a reflected cross-site scripting (XSS) attack, posing a significant risk to users with elevated privileges, such as administrators. Attackers could potentially exploit this flaw to execute malicious scripts in the context of a victim's browser session, leading to data theft or unauthorized access.
Affected Version(s)
Post Timeline 0 < 2.3.10
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved