Reflected XSS Vulnerability in WP GeoNames
CVE-2024-53812
7.1HIGH
Summary
The vulnerability allows for improper neutralization of user input during web page generation, resulting in reflected cross-site scripting (XSS) in the WP GeoNames plugin developed by Jacques Malgrange. This issue affects all versions from n/a through 1.8. An attacker can exploit this vulnerability by tricking users into clicking on a malicious link that executes arbitrary scripts in the context of the user's browser, potentially leading to information theft or other malicious actions.
Affected Version(s)
WP GeoNames <= 1.8
References
CVSS V3.1
Score:
7.1
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Muhamad Agil Fachrian (Patchstack Alliance)