Stored XSS Vulnerability in WordPress Plugin by Upgrade Time Out
CVE-2024-8243
Summary
The Upgrade Time Out Plugin for WordPress prior to version 1.0 is vulnerable to a stored Cross-Site Scripting (XSS) attack due to insufficient CSRF checks and a lack of proper sanitization and escaping of input. This weakness enables attackers to exploit the plugin's functionality, potentially allowing logged-in administrators to unknowingly add malicious scripts. The resulting XSS payloads could be executed in the context of website users, compromising their security and privacy.
Affected Version(s)
WordPress/Plugin Upgrade Time Out Plugin 0 <= 1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved