Stored Cross-Site Scripting Vulnerability in WordPress Core

CVE-2024-4439
7.2HIGH

Key Information

Vendor
WordPress
Vendor
CVE Published:
3 May 2024

Badges

😄 Trended👾 Exploit Exists🔴 Public PoC📰 News Worthy

Summary

The vulnerability CVE-2024-4439 in WordPress Core allows for stored cross-site scripting via user display names in the Avatar block. This vulnerability affects various versions up to 6.5.2 and allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts, as well as unauthenticated attackers to inject arbitrary web scripts in pages with the comment block present. The impact of this vulnerability is considered high, and it affects multiple versions of the WP Core Plugin for WordPress. It is recommended to upgrade to the latest version of the plugin to address this vulnerability. There is potential for exploitation, but there is no specific mention of known exploitation by ransomware groups at this time.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

EPSS Score

1% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability started trending.

  • 👾

    Exploit exists.

  • First article discovered by Rewterz

  • Vulnerability published.

Collectors

NVD Database3 Proof of Concept(s)2 News Article(s)
.