First published: Sat Aug 03 2024(Updated: )
The Zephyr Project Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘filename’ parameter in all versions up to, and including, 3.3.100 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Zephyr Project Manager plugin | <=3.3.100 | |
Dylan James Zephyr Project Manager | <3.3.101 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7356 is classified as a high-severity vulnerability due to its potential for Stored Cross-Site Scripting.
To mitigate CVE-2024-7356, you should update the Zephyr Project Manager plugin to the latest version beyond 3.3.100.
CVE-2024-7356 affects all versions of the Zephyr Project Manager plugin for WordPress up to and including 3.3.100.
Authenticated attackers can exploit CVE-2024-7356 to execute arbitrary scripts in the context of a victim's session.
Yes, a patch is available as part of the updates released for the Zephyr Project Manager plugin.