First published: Wed Mar 05 2025(Updated: )
Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled Featherlight.js JavaScript library (versions 1.7.13 to 1.7.14) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Plugins | >=1.7.13<=1.7.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5667 can lead to Stored Cross-Site Scripting attacks, allowing attackers to execute malicious scripts in the context of a user's session.
CVE-2024-5667 affects WordPress plugins that utilize the Featherlight.js JavaScript library, specifically versions 1.7.13 to 1.7.14.
To mitigate CVE-2024-5667, update the affected plugins to a version that resolves the insecure input sanitization and output escaping issues.
CVE-2024-5667 is considered a serious vulnerability due to its potential for exploiting web applications via Cross-Site Scripting.
Website administrators using affected WordPress plugins should take immediate action to secure their sites against CVE-2024-5667.