First published: Thu May 09 2024(Updated: )
The BuddyPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘user_name’ parameter in versions up to, and including, 12.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
BuddyPress | <=12.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3974 is considered a medium severity vulnerability due to its potential for exploitation by authenticated attackers.
To fix CVE-2024-3974, update the BuddyPress plugin to version 12.5.0 or higher, where the vulnerability has been addressed.
Authenticated users with subscriber-level permissions in BuddyPress versions up to 12.4.0 are affected by CVE-2024-3974.
CVE-2024-3974 is a Stored Cross-Site Scripting (XSS) vulnerability caused by insufficient input sanitization.
The potential impacts of CVE-2024-3974 include unauthorized script execution in the context of the affected user, leading to data compromise or user session hijacking.