First published: Wed Jun 12 2024(Updated: )
The BuddyPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘display_name’ parameter in versions up to, and including, 12.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
BuddyPress | <=12.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4892 is classified as a medium severity vulnerability due to the potential for authenticated attackers to exploit it.
To resolve CVE-2024-4892, update the BuddyPress plugin to version 12.4.2 or later, which addresses the vulnerability.
CVE-2024-4892 affects all versions of the BuddyPress plugin up to and including 12.4.1.
CVE-2024-4892 is a Stored Cross-Site Scripting vulnerability that arises from insufficient input sanitization.
CVE-2024-4892 can only be exploited by authenticated attackers with subscriber-level access or higher.