CVE-2024-6661

The ParityPress – Parity Pricing with Discount Rules plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'Discount Text' in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Configurations

No configuration.

History

29 Jul 2024, 14:12

Type Values Removed Values Added
Summary
  • (es) El complemento ParityPress – Parity Pricing with Discount Rules para WordPress es vulnerable a Cross Site Scripting almacenado a través de 'Discount Text' en todas las versiones hasta la 1.0.0 incluida debido a una sanitización de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html.

27 Jul 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-27 02:15

Updated : 2024-07-29 14:12


NVD link : CVE-2024-6661

Mitre link : CVE-2024-6661

CVE.ORG link : CVE-2024-6661


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')