First published: Thu Mar 07 2024(Updated: )
The User Registration – Custom Registration Form, Login Form, and User Profile WordPress Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Display Name' parameter in all versions up to, and including, 3.1.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires social engineering to successfully exploit, and the impact would be very limited due to the attacker requiring a user to login as the user with the injected payload for execution.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress User Registration & Membership PRO – Custom Registration Form, Login Form, and User Profile | <=3.1.4 | |
Wpeverest User Registration \& Membership Wordpress | <3.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1720 is classified as a high severity vulnerability due to its potential for stored cross-site scripting exploitation.
To fix CVE-2024-1720, update the User Registration – Custom Registration Form, Login Form, and User Profile WordPress Plugin to version 3.1.5 or later.
Any user of the User Registration – Custom Registration Form, Login Form, and User Profile WordPress Plugin version 3.1.4 or earlier is affected by CVE-2024-1720.
CVE-2024-1720 is a Stored Cross-Site Scripting (XSS) vulnerability.
CVE-2024-1720 exploits the 'Display Name' parameter due to insufficient input sanitization and output escaping.