First published: Thu May 23 2024(Updated: )
The Pet Manager WordPress plugin through 1.4 does not sanitise and escape some of its Pet settings, which could allow high privilege users such as Contributor to perform Stored Cross-Site Scripting attacks.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Pet Manager | <=1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3918 has a medium severity rating due to its potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-3918, update the WordPress Pet Manager plugin to the latest version that includes security patches.
CVE-2024-3918 affects high privilege users such as Contributors who may exploit the vulnerability to perform attacks.
The impact of CVE-2024-3918 allows attackers to execute malicious scripts in the context of the victim's browser session.
CVE-2024-3918 can be considered relatively easy to exploit for users with the proper privileges due to insufficient input sanitization.