Parallax Image Plugin Vulnerable to Stored Cross-Site Scripting
CVE-2024-9898
6.4MEDIUM
Summary
The Parallax Image plugin for WordPress contains a vulnerability that allows attackers with contributor-level access or higher to execute arbitrary web scripts through the dd-parallax shortcode. This vulnerability arises from insufficient input sanitization and output escaping, which enables the injection of malicious code into web pages. When a user accesses a compromised page, the injected scripts execute, potentially compromising sensitive information and user sessions. The issue affects all versions up to and including 1.8, making it crucial for site administrators to ensure they are using updated and secure versions of the plugin.
Affected Version(s)
Parallax Image * <= 1.8
References
CVSS V3.1
Score:
6.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Peter Thaleikis