First published: Thu Aug 29 2024(Updated: )
The Viral Signup WordPress plugin through 2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wow-company Viral Signup Wordpress | <=2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6927 has a critical severity rating due to the potential for stored cross-site scripting attacks.
To fix CVE-2024-6927, update the Viral Signup WordPress plugin to the latest version beyond 2.1.
CVE-2024-6927 primarily affects high-privilege users, such as admins, using versions of the Viral Signup plugin up to 2.1.
CVE-2024-6927 could allow high-privilege users to perform stored cross-site scripting attacks, potentially compromising site security.
Yes, CVE-2024-6927 is particularly relevant in multisite setups where certain capabilities are restricted.