First published: Mon Sep 30 2024(Updated: )
The Post Grid WordPress plugin before 7.5.0 does not sanitise and escape some of its Grid settings, which could allow high privilege users such as Editor and above to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Radiustheme The Post Grid | <7.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3635 has a high severity rating due to its potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-3635, update the Post Grid WordPress plugin to version 7.5.0 or later.
The consequences of CVE-2024-3635 include unauthorized access to user accounts and compromise of sensitive information via Stored Cross-Site Scripting.
CVE-2024-3635 affects users of the Post Grid WordPress plugin prior to version 7.5.0, particularly those with high privilege roles like Editor and above.
Yes, CVE-2024-3635 can be exploited remotely by high privilege users to execute malicious scripts.