Plugin Vulnerability Leads to Reflected Cross-Site Scripting in Old Web Browsers
CVE-2024-8056
Key Information:
- Vendor
- Wordpress
- Status
- Vendor
- CVE Published:
- 12 September 2024
Badges
Summary
The MM-Breaking News WordPress plugin prior to version 0.7.9 fails to properly escape the 'REQUEST_URI' parameter. This oversight can lead to reflected cross-site scripting (XSS) attacks, especially impacting users of older web browsers. Attackers may exploit this vulnerability by crafting malicious URLs that, when accessed, can execute harmful scripts within the context of the victim's browser, potentially leading to unauthorized access or data exposure.
Affected Version(s)
MM-Breaking News 0 <= 0.7.9
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved