Unfiltered HTML Settings Vulnerability in Font Farsi WordPress Plugin
CVE-2024-1752

Currently unrated

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
8 April 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

The Font Farsi WordPress plugin, up to version 1.6.6, includes a vulnerability that fails to properly sanitize and escape certain user-configurable settings. This oversight may allow users with elevated privileges, such as administrators, to execute stored cross-site scripting (XSS) attacks within the application, even in environments where the unfiltered_html capability is restricted (such as multisite setups). This flaw emphasizes the necessity for stringent security practices and regular updates to maintain application integrity and protect against potential exploits.

Affected Version(s)

Font Farsi 0 <= 1.6.6

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Bob Matyas
WPScan
.