Stored Cross-Site Scripting Vulnerability in RafflePress Plugin for WordPress
CVE-2024-1935

7.2HIGH

Summary

The RafflePress plugin, designed to enhance website traffic, email subscriber count, and social media following, is exposed to a Stored Cross-Site Scripting vulnerability. This flaw arises from inadequate input sanitization related to the 'parent_url' parameter, impacting all versions up to 1.12.5. It allows unauthenticated attackers to inject arbitrary scripts into web pages, which may execute when users visit the compromised pages. Website administrators using this plugin should apply the latest updates to mitigate the risks associated with this vulnerability.

Affected Version(s)

Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers * <= 1.12.5

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Krzysztof Zając
.