First published: Wed Apr 10 2024(Updated: )
The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'reg-single-checkbox' shortcode in all versions up to, and including, 4.15.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Properfraction Profilepress | <4.15.6 | |
WordPress ProfilePress | <=4.15.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3210 is considered a high severity vulnerability due to the potential for stored cross-site scripting.
To fix CVE-2024-3210, you should update the ProfilePress plugin to version 4.15.6 or later.
CVE-2024-3210 affects all versions of the ProfilePress plugin up to and including version 4.15.5.
CVE-2024-3210 is a stored cross-site scripting vulnerability that can lead to unauthorized access and data compromise.
Yes, CVE-2024-3210 can potentially allow attackers to inject malicious scripts that could impact user data and security.