CVE-2019-11872

The Hustle (aka wordpress-popup) plugin 6.0.7 for WordPress is vulnerable to CSV Injection as it allows for injecting malicious code into a pop-up window. Successful exploitation grants an attacker with a right to execute malicious code on the administrator's computer through Excel functions as the plugin does not sanitize the user's input and allows insertion of any text.
Configurations

Configuration 1 (hide)

cpe:2.3:a:incsub:hustle:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 04:21

Type Values Removed Values Added
References () https://blog.reddy.io/2019/05/24/reddy-solutions-found-a-csv-injection-vulnerability-in-hustle-wordpress-plugin/ - Broken Link, Exploit, Third Party Advisory () https://blog.reddy.io/2019/05/24/reddy-solutions-found-a-csv-injection-vulnerability-in-hustle-wordpress-plugin/ - Broken Link, Exploit, Third Party Advisory
References () https://blog.reddy.io/category/cybersecurity/ - Broken Link, Exploit, Third Party Advisory () https://blog.reddy.io/category/cybersecurity/ - Broken Link, Exploit, Third Party Advisory
References () https://wordpress.org/plugins/wordpress-popup/#developers - Release Notes () https://wordpress.org/plugins/wordpress-popup/#developers - Release Notes
References () https://wpvulndb.com/vulnerabilities/9326 - Third Party Advisory () https://wpvulndb.com/vulnerabilities/9326 - Third Party Advisory

Information

Published : 2019-05-29 19:29

Updated : 2024-11-21 04:21


NVD link : CVE-2019-11872

Mitre link : CVE-2019-11872

CVE.ORG link : CVE-2019-11872


JSON object : View

Products Affected

incsub

  • hustle
CWE
CWE-1236

Improper Neutralization of Formula Elements in a CSV File