CVE-2024-9892

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)

Published: Oct 18, 2024 / Updated: 32d ago

010
CVSS 4.8EPSS 0.04%Medium
CVE info copied to clipboard

The Add Widget After Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2024-9892. See article

Oct 18, 2024 at 4:40 AM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as LOW

Oct 18, 2024 at 4:40 AM
CVE Assignment

NVD published the first details for CVE-2024-9892

Oct 18, 2024 at 5:15 AM
CVSS

A CVSS base score of 4.4 has been assigned.

Oct 18, 2024 at 5:20 AM / nvd
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.7%)

Oct 18, 2024 at 10:20 AM
CVSS

A CVSS base score of 4.8 has been assigned.

Oct 22, 2024 at 3:51 PM / nvd
Static CVE Timeline Graph

Affected Systems

Arelthiaphillips/add_widget_after_content
+null more

Attack Patterns

CAPEC-209: XSS Using MIME Type Mismatch
+null more

News

CVE-2024-9892
The Add Widget After Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping. Gravedad 3.1 (CVSS 3.1 Base Score)
Add Widget After Content <= 2.4.6 - Authenticated (Administrator+) Stored Cross-Site Scripting
Apintop - MEDIUM - CVE-2024-9892 The Add Widget After Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
CVE-2024-9892 - WordPress Add Widget After Content Stored Cross-Site Scripting
CVE ID : CVE-2024-9892 Published : Oct. 18, 2024, 5:15 a.m. 16 minutes ago Description : The Add Widget After Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Severity:
WORDPRESS APINTOP ADD WIDGET AFTER CONTENT CVE-2024-9892 CVE-2024-9892 Add Widget After Content https://www. cve.org/CVERecord?id=CVE-2024- 9892 https://www. wordfence.com/threat-intel/vul nerabilities/id/e02472a8-5b88-43ad-86f3-e890b49899ad?source=cve https:// plugins.trac.wordpress.org/bro wser/add-widget-after-content/trunk/add-widget-after-content-admin.php#L320 # wordpress # apintop # AddWidgetAfterContent # CVE_2024_9892 # bot
CVE-2024-9892
The Add Widget After Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
See 3 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:High
User Interaction:Required
Scope:Changed
Confidentiality:Low
Integrity:Low
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI