First published: Tue Sep 24 2024(Updated: )
The Pixel Cat – Conversion Pixel Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.0.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fatcatapps Pixel Cat | <3.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-8544 is classified as medium due to the potential for reflected cross-site scripting attacks.
To fix CVE-2024-8544, update the Pixel Cat – Conversion Pixel Manager plugin to version 3.0.6 or later.
All users of the Pixel Cat – Conversion Pixel Manager plugin for WordPress prior to version 3.0.6 are affected by CVE-2024-8544.
CVE-2024-8544 is a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts.
Yes, CVE-2024-8544 can be exploited by unauthenticated attackers.