First published: Wed Jun 05 2024(Updated: )
The GP Premium plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the message parameter in all versions up to, and including, 2.4.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
GeneratePress | <2.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-3469 is considered moderate due to its potential impact on user data and site integrity.
To fix CVE-2024-3469, update the GP Premium plugin to version 2.4.1 or later.
All users of the GP Premium plugin for WordPress versions up to and including 2.4.0 are affected by CVE-2024-3469.
CVE-2024-3469 is categorized as a Reflected Cross-Site Scripting vulnerability.
Yes, unauthenticated attackers can exploit CVE-2024-3469 due to insufficient input sanitization.