First published: Tue May 21 2024(Updated: )
The Carousel Slider WordPress plugin before 2.2.11 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Carousel Slider | <2.2.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4372 has been assigned a moderate severity rating due to its potential for Cross-Site Scripting attacks.
To fix CVE-2024-4372, update the Carousel Slider plugin to version 2.2.11 or later.
Users with roles as low as editor on sites running versions of the Carousel Slider plugin prior to 2.2.11 are affected by CVE-2024-4372.
CVE-2024-4372 is a Cross-Site Scripting (XSS) vulnerability that arises from improper sanitization of user input.
Yes, CVE-2024-4372 can potentially be exploited remotely by users with valid credentials.