First published: Fri Dec 13 2024(Updated: )
The WP Crowdfunding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the wp-crowdfunding/search block in all versions up to, and including, 2.1.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Themeum WP Crowdfunding | <2.1.13 | |
WordPress WP Crowdfunding | <=2.1.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11910 is classified as a high-severity vulnerability due to its impact on user data through stored cross-site scripting.
To fix CVE-2024-11910, update the WP Crowdfunding plugin to version 2.1.13 or later, which includes necessary security patches.
CVE-2024-11910 affects all versions of the WP Crowdfunding plugin for WordPress up to and including 2.1.12.
CVE-2024-11910 is a Stored Cross-Site Scripting (XSS) vulnerability caused by insufficient input sanitization.
Yes, authenticated attackers can exploit CVE-2024-11910 to inject malicious scripts via the wp-crowdfunding/search block.