Unfiltered HTML Output in Category Posts Widget Could Lead to Stored XSS
CVE-2024-6158

Currently unrated

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
12 August 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

The Category Posts Widget WordPress plugin before 4.9.17, term-and-category-based-posts-widget WordPress plugin before 4.9.13 does not validate and escape some of its "Category Posts" widget settings before outputting them back in a page/post where the Widget is embed, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

Affected Version(s)

Category Posts Widget 0 < 4.9.17

term-and-category-based-posts-widget 0 < 4.9.13

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Dmitrii Ignatyev
WPScan
.