First published: Sat Jan 18 2025(Updated: )
The Easy Digital Downloads – eCommerce Payments and Subscriptions made easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Title value in all versions up to, and including, 3.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Easy Digital Downloads | <3.3.3 | |
Easy Digital Downloads eCommerce Payments and Subscriptions | <=3.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13517 is classified as a Stored Cross-Site Scripting vulnerability impacting Easy Digital Downloads versions up to 3.3.2.
To remediate CVE-2024-13517, update Easy Digital Downloads to version 3.3.3 or later where the vulnerability is resolved.
CVE-2024-13517 affects all versions of Easy Digital Downloads up to and including 3.3.2.
CVE-2024-13517 is a Stored Cross-Site Scripting vulnerability due to insufficient input sanitization and output escaping.
An attacker could potentially execute malicious scripts in the context of a user's browser session, leading to unauthorized actions and data exposure.