The Sticky Buttons – floating buttons builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via sticky URLs in all versions up to, and including, 3.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
References
Configurations
History
21 Nov 2024, 08:47
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.4 |
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3024941%40sticky-buttons&new=3024941%40sticky-buttons&sfp_email=&sfph_mail= - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/b3c070be-e955-4076-9878-0b1044766397?source=cve - Patch, Third Party Advisory |
29 Jan 2024, 22:42
Type | Values Removed | Values Added |
---|---|---|
First Time |
Wow-company sticky Buttons
Wow-company |
|
CPE | cpe:2.3:a:wow-company:sticky_buttons:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
CWE | CWE-79 | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/b3c070be-e955-4076-9878-0b1044766397?source=cve - Patch, Third Party Advisory | |
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3024941%40sticky-buttons&new=3024941%40sticky-buttons&sfp_email=&sfph_mail= - Patch |
23 Jan 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-23 11:15
Updated : 2024-11-21 08:47
NVD link : CVE-2024-0703
Mitre link : CVE-2024-0703
CVE.ORG link : CVE-2024-0703
JSON object : View
Products Affected
wow-company
- sticky_buttons
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')