First published: Tue Apr 09 2024(Updated: )
The Memberpress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘message’ and 'error' parameters in all versions up to, and including, 1.11.26 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Note - the issue was partially patched in 1.11.25, but could still potentially be exploited under some circumstances.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
MemberPress | <1.11.27 | |
MemberPress | <=1.11.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1412 is considered a medium severity vulnerability due to the potential for unauthenticated attackers to exploit it.
To fix CVE-2024-1412, upgrade the Memberpress plugin to version 1.11.27 or later.
CVE-2024-1412 affects all versions of Memberpress up to and including 1.11.26.
CVE-2024-1412 is a Reflected Cross-Site Scripting vulnerability due to insufficient input sanitization.
Unauthenticated attackers can exploit CVE-2024-1412 due to the lack of required authentication for the vulnerable parameters.