First published: Wed Jan 15 2025(Updated: )
The Car Demon plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search_condition' parameter in all versions up to, and including, 1.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=1.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13334 has been rated as a medium severity vulnerability due to its potential for exploitation via reflected cross-site scripting.
To fix CVE-2024-13334, update the Car Demon plugin to a version higher than 1.8.1, as this issue has been resolved in later releases.
CVE-2024-13334 affects all users of the Car Demon plugin for WordPress, specifically those using version 1.8.1 or earlier.
CVE-2024-13334 is classified as a reflected cross-site scripting (XSS) vulnerability, which allows attackers to inject malicious scripts.
Yes, CVE-2024-13334 can be exploited by unauthenticated attackers due to inadequate input sanitization in the affected plugin.