First published: Mon Feb 05 2024(Updated: )
The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Pricing Table Elementor Widget in all versions up to, and including, 2.10.27 due to insufficient input sanitization and output escaping on the user supplied link URL. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Themeisle Orbit Fox | <=2.10.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-0508 is considered high due to the potential for stored cross-site scripting (XSS).
To fix CVE-2024-0508, update the Orbit Fox by ThemeIsle plugin to a version higher than 2.10.27 which includes security patches.
CVE-2024-0508 affects the Orbit Fox by ThemeIsle plugin for WordPress in all versions up to and including 2.10.27.
Yes, CVE-2024-0508 can be exploited remotely since it involves user-supplied input that is not properly sanitized.
The responsibility for patching CVE-2024-0508 lies with the website administrators using the affected plugin, as developers will release updates to address the vulnerability.