The Post Grid WordPress plugin before 7.5.0 does not sanitise and escape some of its Grid settings, which could allow high privilege users such as Editor and above to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/63cbe5f4-fe0f-499f-a964-cf4fbedcfa25/ | Exploit Third Party Advisory |
Configurations
History
02 Oct 2024, 14:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/63cbe5f4-fe0f-499f-a964-cf4fbedcfa25/ - Exploit, Third Party Advisory | |
CWE | CWE-79 | |
CPE | cpe:2.3:a:radiustheme:the_post_grid:*:*:*:*:*:wordpress:*:* | |
First Time |
Radiustheme
Radiustheme the Post Grid |
30 Sep 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
30 Sep 2024, 12:45
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Sep 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-30 06:15
Updated : 2024-10-02 14:30
NVD link : CVE-2024-3635
Mitre link : CVE-2024-3635
CVE.ORG link : CVE-2024-3635
JSON object : View
Products Affected
radiustheme
- the_post_grid
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')