First published: Sat Nov 23 2024(Updated: )
The JobBoardWP – Job Board Listings and Submissions plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.3.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
JobBoardWP | <=1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10880 is classified as a Reflected Cross-Site Scripting vulnerability, which is considered a high severity risk due to its potential for exploiting user interactions.
To fix CVE-2024-10880, update the JobBoardWP – Job Board Listings and Submissions plugin to version 1.3.1 or later, where the vulnerability has been addressed.
All versions of the JobBoardWP – Job Board Listings and Submissions plugin up to and including 1.3.0 are affected by CVE-2024-10880.
Yes, CVE-2024-10880 can be exploited remotely through crafted URLs that trigger the Reflected Cross-Site Scripting vulnerability.
The potential impacts of CVE-2024-10880 include the ability for attackers to execute malicious scripts in the context of the user’s browser, compromising user sessions or stealing sensitive information.