First published: Mon Mar 11 2024(Updated: )
The Enhanced Text Widget WordPress plugin before 1.6.6 does not validate and escape some of its Widget options before outputting them back in attributes, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Enhanced Text Widget | <1.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-0559 is considered high due to the potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-0559, update the Enhanced Text Widget plugin to version 1.6.6 or later.
CVE-2024-0559 impacts WordPress sites using the Enhanced Text Widget plugin before version 1.6.6, particularly affecting high privilege users such as administrators.
CVE-2024-0559 can allow attackers to execute Stored Cross-Site Scripting attacks.
No, the Enhanced Text Widget plugin does not properly validate and escape some of its Widget options, leaving it vulnerable to attacks.