Reflected Cross-Site Scripting in Passbeemedia Web Push Notification Plugin
CVE-2024-13877
Summary
The Passbeemedia Web Push Notification plugin for WordPress, up to version 1.0.0, exposes a vulnerability due to improper sanitization and escaping of parameters before rendering them on the web page. This flaw allows attackers to inject malicious scripts that, when executed, can compromise high-privilege user accounts, such as administrators, by exploiting reflected cross-site scripting. The lack of input validation presents a significant risk, necessitating immediate attention from site administrators to secure their websites.
Affected Version(s)
Passbeemedia Web Push Notification 0 <= 1.0.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved