First published: Thu Aug 29 2024(Updated: )
The Front End Users plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'user-search' shortcode in all versions up to, and including, 3.2.28 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Etoilewebdesign Front End Users | <3.2.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7606 is considered a high severity vulnerability due to its potential for Stored Cross-Site Scripting attacks.
To fix CVE-2024-7606, update the Front End Users plugin to version 3.2.29 or later.
CVE-2024-7606 affects all versions of the Front End Users plugin up to and including 3.2.28.
CVE-2024-7606 is a Stored Cross-Site Scripting (XSS) vulnerability.
CVE-2024-7606 is caused by insufficient input sanitization and output escaping on user-supplied attributes in the plugin's user-search shortcode.