Stored Cross-Site Scripting Flaw in PVN Auth Popup WordPress Plugin
CVE-2024-6713
Key Information:
- Vendor
WordPress
- Status
- Vendor
- CVE Published:
- 15 May 2025
Badges
What is CVE-2024-6713?
The PVN Auth Popup WordPress plugin, when used up to version 1.0.0, exhibits a serious security flaw due to insufficient sanitization and escaping of its settings. This vulnerability enables high privilege users, such as administrators, to conduct Stored Cross-Site Scripting (XSS) attacks. This risk persists even in environments where the unfiltered_html capability is restricted, such as multisite configurations, making it crucial for users to update and secure their installations to prevent exploitations.
Affected Version(s)
PVN Auth Popup 0 <= 1.0.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved