First published: Thu May 02 2024(Updated: )
The WP ULike – Most Advanced WordPress Marketing Toolkit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a user's display name in all versions up to, and including, 4.6.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP ULike | <=4.6.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1759 has a high severity due to its potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-1759, update the WP ULike plugin to the latest version that addresses the vulnerability.
CVE-2024-1759 affects all versions of the WP ULike plugin up to and including version 4.6.9 for WordPress.
CVE-2024-1759 enables Stored Cross-Site Scripting attacks through insufficient input sanitization of user display names.
Yes, exploitation of CVE-2024-1759 requires authentication, as it targets authenticated users' display names.