First published: Thu Feb 13 2025(Updated: )
The Everest Forms WordPress plugin before 3.0.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Everest Forms | <3.0.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13125 is considered a high severity vulnerability due to the potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-13125, update the Everest Forms WordPress plugin to version 3.0.8.1 or later.
Users of the Everest Forms WordPress plugin prior to version 3.0.8.1 are affected by CVE-2024-13125.
CVE-2024-13125 can lead to Stored Cross-Site Scripting attacks which may allow attackers to execute malicious scripts in the user's browser.
No, while CVE-2024-13125 is notable in multisite setups where unfiltered HTML is disallowed, it can pose risks in any installation with the vulnerable plugin.