First published: Wed Mar 13 2024(Updated: )
The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Pricing Table widget in the $settings['title_tags'] parameter in all versions up to, and including, 2.10.30 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Orbit Fox by Themeisle | <=2.10.30 | |
Orbit Fox by Themeisle | <2.10.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1499 has a medium severity rating due to its potential for exploitation through stored cross-site scripting.
To fix CVE-2024-1499, update the Orbit Fox plugin to version 2.10.31 or later as it includes the necessary security patches.
CVE-2024-1499 affects all versions of the Orbit Fox plugin for WordPress up to and including version 2.10.30.
CVE-2024-1499 is classified as a stored cross-site scripting (XSS) vulnerability.
Yes, CVE-2024-1499 can be exploited easily due to insufficient input sanitization and output escaping methods.