First published: Wed Feb 19 2025(Updated: )
The Raptive Ads plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'poc' parameter in all versions up to, and including, 3.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Raptive Ads | <=3.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13363 is considered a high severity vulnerability due to its potential for reflected cross-site scripting attacks.
To fix CVE-2024-13363, update the Raptive Ads plugin to the latest version beyond 3.6.3 where the vulnerability is patched.
The impact of CVE-2024-13363 allows unauthenticated attackers to inject malicious scripts via the 'poc' parameter.
All versions of the Raptive Ads plugin up to and including version 3.6.3 are affected by CVE-2024-13363.
Yes, CVE-2024-13363 is exploitable by unauthenticated users, making it a significant risk.