First published: Fri May 03 2024(Updated: )
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeBard CodeBard's Patron Button and Widgets for Patreon allows Reflected XSS.This issue affects CodeBard's Patron Button and Widgets for Patreon: from n/a through 2.2.0.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Codebard's Patron Button And Widgets For Patreon | <=2.2.0 | |
Patron Button And Widgets For Patreon | <=2.2.0 | |
CodeBard Patron Button and Widgets for Patreon | <=2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-33928 is classified as a medium severity vulnerability due to its potential for reflected cross-site scripting (XSS) attacks.
To fix CVE-2024-33928, update the CodeBard Patron Button and Widgets for Patreon to version 2.2.1 or later.
CVE-2024-33928 affects versions of CodeBard's Patron Button and Widgets for Patreon up to and including 2.2.0.
CVE-2024-33928 is an improper neutralization of input during web page generation leading to reflected cross-site scripting (XSS).
Yes, CVE-2024-33928 can potentially lead to data compromise by allowing attackers to execute arbitrary scripts in the context of a user's browser.