First published: Sat Feb 08 2025(Updated: )
The Simple add pages or posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Simple add pages or posts | <=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13850 is classified as a high severity vulnerability due to the potential for stored cross-site scripting attacks.
To remediate CVE-2024-13850, update the Simple add pages or posts plugin to the latest version beyond 2.0.0.
CVE-2024-13850 affects users of the Simple add pages or posts plugin for WordPress versions up to and including 2.0.0.
CVE-2024-13850 is a stored cross-site scripting (XSS) vulnerability caused by inadequate input validation and output escaping.
No, CVE-2024-13850 requires that an attacker is authenticated with administrator-level access to exploit the vulnerability.