First published: Thu May 16 2024(Updated: )
The Yoast SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘display_name’ author meta in all versions up to, and including, 22.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Yoast Local SEO | <=22.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4984 has a high severity rating due to its potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-4984, update the Yoast SEO plugin to version 22.7 or later.
CVE-2024-4984 affects all versions of the Yoast SEO plugin for WordPress up to and including version 22.6.
CVE-2024-4984 is classified as a Stored Cross-Site Scripting vulnerability.
Yes, CVE-2024-4984 can be exploited remotely by authenticated attackers who have contributor permissions.