Unauthorized Stored Cross-Site Scripting (XSS) vulnerability in AZIndex WordPress plugin
CVE-2024-7687
Key Information:
Badges
Summary
The AZIndex WordPress plugin has been identified with vulnerabilities due to missing Cross-Site Request Forgery (CSRF) checks in certain functionalities. This oversight allows unauthorized users to submit requests on behalf of logged-in administrators, potentially resulting in the insertion of Stored Cross-Site Scripting (XSS) payloads. The absence of appropriate input sanitization and escaping mechanisms magnifies the risk, enabling attackers to exploit the plugin and compromise the integrity of the affected WordPress installations. Webmasters utilizing this plugin should assess their environment and apply necessary mitigations to prevent exploitation.
Affected Version(s)
AZIndex 0 <= 0.8.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved