First published: Wed Feb 12 2025(Updated: )
The FuseDesk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fusedesk_newcase' shortcode in all versions up to, and including, 6.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
FuseDesk | <=6.6.1 | |
Fusedesk for WordPress | <6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-13459 is categorized as medium due to the potential for stored cross-site scripting attacks.
To fix CVE-2024-13459, update the FuseDesk plugin to version 6.6.2 or later, which contains patches for the vulnerability.
CVE-2024-13459 affects all versions of the FuseDesk plugin up to and including version 6.6.1.
CVE-2024-13459 is a Stored Cross-Site Scripting vulnerability caused by insufficient input sanitization in the FuseDesk plugin.
Website owners using the FuseDesk plugin on their WordPress sites are impacted by CVE-2024-13459.