CVE-2024-5544

The Media Library Assistant plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the order parameter in all versions up to, and including, 3.17 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Configurations

Configuration 1 (hide)

cpe:2.3:a:davidlingren:media_library_assistant:*:*:*:*:*:wordpress:*:*

History

05 Jul 2024, 14:46

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/changeset/3110092/ - () https://plugins.trac.wordpress.org/changeset/3110092/ - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0c34d3-5c7d-43a5-9430-2ebdc155123f?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0c34d3-5c7d-43a5-9430-2ebdc155123f?source=cve - Third Party Advisory
First Time Davidlingren
Davidlingren media Library Assistant
CPE cpe:2.3:a:davidlingren:media_library_assistant:*:*:*:*:*:wordpress:*:*
CWE CWE-79

02 Jul 2024, 12:09

Type Values Removed Values Added
Summary
  • (es) El complemento Media Library Assistant para WordPress es vulnerable a Cross-Site Scripting Reflejado a través del parámetro de orden en todas las versiones hasta la 3.17 incluida debido a una sanitización de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en páginas que se ejecutan si logran engañar a un usuario para que realice una acción como hacer clic en un enlace.

02 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-02 08:15

Updated : 2024-07-05 14:46


NVD link : CVE-2024-5544

Mitre link : CVE-2024-5544

CVE.ORG link : CVE-2024-5544


JSON object : View

Products Affected

davidlingren

  • media_library_assistant
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')