First published: Thu Mar 13 2025(Updated: )
The Schedule WordPress plugin through 1.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Schedule | <=1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13891 is classified as a high severity vulnerability due to its potential impact on high privilege users.
To fix CVE-2024-13891, update the WordPress Schedule plugin to a version greater than 1.0.0, which includes the necessary security patches.
CVE-2024-13891 affects users of the WordPress Schedule plugin up to version 1.0.0, particularly those with high privilege roles like admin.
CVE-2024-13891 is a reflected Cross-Site Scripting (XSS) vulnerability that arises from improper input sanitization.
While CVE-2024-13891 primarily targets high privilege users, it can also be exploited by low privilege users with the right conditions.