First published: Tue Jan 23 2024(Updated: )
The Sticky Buttons – floating buttons builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via sticky URLs in all versions up to, and including, 3.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wow-Company Sticky Buttons | <=3.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0703 is considered a medium severity vulnerability due to the potential for stored cross-site scripting attacks.
To fix CVE-2024-0703, update the Sticky Buttons plugin to version 3.2.3 or later.
All users of the Sticky Buttons plugin for WordPress up to and including version 3.2.2 are affected by CVE-2024-0703.
CVE-2024-0703 facilitates stored cross-site scripting (XSS) attacks due to insufficient input sanitization.
Yes, exploitation of CVE-2024-0703 requires an authenticated attacker with administrative privileges.