Stored Cross-Site Scripting in Simple Membership Plugin for WordPress
CVE-2024-1985
4.7MEDIUM
Summary
The Simple Membership plugin for WordPress is susceptible to Stored Cross-Site Scripting via the 'Display Name' parameter. This flaw exists in all versions up to and including 4.4.2, primarily due to inadequate input sanitization and output escaping. An unauthenticated attacker can exploit this vulnerability to inject arbitrary web scripts that execute when a user accesses an affected page. Although the risk is mitigated by the need for social engineering to trick users into interacting with the compromised functionality, it's crucial for site administrators to apply security best practices to mitigate potential exploitation.
Affected Version(s)
Simple Membership * <= 4.4.2
References
CVSS V3.1
Score:
4.7
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Matthew Rollings