First published: Wed Dec 04 2024(Updated: )
The NPS computy plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'data1' and 'data2' parameters in all versions up to, and including, 2.8.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Computy NPS | <=2.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-11807 is classified as high due to the potential for unauthenticated attackers to exploit the vulnerability.
To fix CVE-2024-11807, update the NPS computy plugin to version 2.8.1 or later which includes patches for the vulnerability.
All versions of NPS computy up to and including 2.8.0 are affected by CVE-2024-11807.
CVE-2024-11807 is a reflected Cross-Site Scripting (XSS) vulnerability.
The CVE-2024-11807 vulnerability can be exploited by unauthenticated attackers.