First published: Thu Nov 21 2024(Updated: )
The affiliate-toolkit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via a URL in all versions up to, and including, 3.6.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress affiliate-toolkit | <=3.6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-10675 is rated as high due to the potential for unauthenticated attackers to execute arbitrary scripts.
To fix CVE-2024-10675, update the affiliate-toolkit plugin to version 3.6.8 or later.
All versions of the affiliate-toolkit plugin up to and including 3.6.7 are affected by CVE-2024-10675.
Any users of the affiliate-toolkit plugin for WordPress who have not updated to version 3.6.8 or later are affected by CVE-2024-10675.
CVE-2024-10675 is a Reflected Cross-Site Scripting (XSS) vulnerability.