First published: Tue Mar 25 2025(Updated: )
The Simple Banner WordPress plugin before 3.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simple Banner | <3.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12769 has a high severity due to potential Stored Cross-Site Scripting vulnerabilities.
To fix CVE-2024-12769, update the Simple Banner WordPress plugin to version 3.0.4 or later.
CVE-2024-12769 affects WordPress sites using the Simple Banner plugin version earlier than 3.0.4.
CVE-2024-12769 can facilitate Stored Cross-Site Scripting attacks by allowing high privilege users to inject malicious scripts.
Yes, user action is required to mitigate risks by updating the plugin to the latest version.