First published: Fri Dec 13 2024(Updated: )
The Image Widget WordPress plugin before 4.4.11 does not sanitise and escape some of its Image Widget settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
StellarWP Image Widget | <4.4.11 | |
StellarWP Image Widget | <4.4.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10939 is considered a high severity vulnerability due to the potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-10939, update the Image Widget plugin to version 4.4.11 or later.
CVE-2024-10939 affects WordPress users who have the Image Widget plugin installed prior to version 4.4.11.
CVE-2024-10939 is a Stored Cross-Site Scripting vulnerability.
Yes, CVE-2024-10939 allows high privilege users, such as admins, to exploit the vulnerability.