First published: Wed Jul 24 2024(Updated: )
The WP ULike WordPress plugin before 4.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
TechnoWich WP ULike | <4.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-6094 is considered high due to the potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-6094, update the WP ULike plugin to version 4.7.1 or later.
WP ULike versions prior to 4.7.1 are affected by CVE-2024-6094.
High privilege users, such as admin, can exploit CVE-2024-6094 to perform Stored Cross-Site Scripting attacks.
Yes, CVE-2024-6094 can affect multisite setups even when the unfiltered_html capability is disallowed.