CVE-2024-9589

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)

Published: Oct 22, 2024 / Updated: 28d ago

010
CVSS 4.8EPSS 0.05%Medium
CVE info copied to clipboard

The Category and Taxonomy Meta Fields plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'new_meta_name' parameter in the 'wpaft_option_page' function in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with administrator-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2024-9589. See article

Oct 22, 2024 at 7:51 AM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as LOW

Oct 22, 2024 at 7:52 AM
CVE Assignment

NVD published the first details for CVE-2024-9589

Oct 22, 2024 at 8:15 AM
CVSS

A CVSS base score of 5.5 has been assigned.

Oct 22, 2024 at 8:25 AM / nvd
EPSS

EPSS Score was set to: 0.05% (Percentile: 14.9%)

Oct 23, 2024 at 10:38 AM
CVSS

A CVSS base score of 4.8 has been assigned.

Oct 29, 2024 at 4:10 PM / nvd
Static CVE Timeline Graph

Affected Systems

Aftabhusain/category_and_taxonomy_meta_fields
+null more

Attack Patterns

CAPEC-209: XSS Using MIME Type Mismatch
+null more

News

CVE Alert: CVE-2024-9589 - https://www. redpacketsecurity.com/cve_aler t_cve-2024-9589/ # OSINT # ThreatIntel # CyberSecurity # cve_2024_9589
null
- MEDIUM - CVE-2024-9589 The Category and Taxonomy Meta Fields plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'new_meta_name' parameter in the 'wpaft_option_page' function in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with administrator-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Medium - CVE-2024-9589 - The Category and Taxonomy Meta Fields plugin...
The Category and Taxonomy Meta Fields plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'new_meta_name' parameter in the 'wpaft_option_page' function in...
CVE-2024-9589
The Category and Taxonomy Meta Fields plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'new_meta_name' parameter in the 'wpaft_option_page' function in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. Gravedad 3.1 (CVSS 3.1 Base Score)
CVE-2024-9589 - WordPress Category and Taxonomy Meta Fields Stored Cross-Site Scripting Vulnerability
CVE ID : CVE-2024-9589 Published : Oct. 22, 2024, 8:15 a.m. 1 hour, 36 minutes ago Description : The Category and Taxonomy Meta Fields plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'new_meta_name' parameter in the 'wpaft_option_page' function in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with administrator-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Severity:
See 5 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:High
User Interaction:Required
Scope:Changed
Confidentiality:Low
Integrity:Low
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI