Cross-Site Scripting Vulnerability in Think201 FAQs Plugin by Patchstack
CVE-2024-56033
7.1HIGH
Key Information:
- Vendor
- Think201
- Status
- Faqs
- Vendor
- CVE Published:
- 2 January 2025
Summary
The Think201 FAQs Plugin is susceptible to a Cross-Site Scripting (XSS) vulnerability, specifically due to improper neutralization of user input during web page generation. This security flaw allows attackers to execute arbitrary JavaScript code in the context of the affected users. The vulnerability is present in all versions from n/a through 1.0.2. Ensuring proper sanitization of input can mitigate this risk, as it prevents the execution of malicious scripts, thereby safeguarding the integrity and security of the web application.
Affected Version(s)
FAQs <= 1.0.2
References
CVSS V3.1
Score:
7.1
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Muhamad Agil Fachrian (Patchstack Alliance)