First published: Sat Sep 21 2024(Updated: )
The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.9.16 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mailchimp | <4.9.17 |
https://github.com/ibericode/mailchimp-for-wordpress/commit/60c6bfc260a7974f791af1d4ad4a032a3e0bdd3c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8680 has a medium severity level due to its potential for stored cross-site scripting (XSS) attacks.
To fix CVE-2024-8680, update the MC4WP: Mailchimp for WordPress plugin to the latest version beyond 4.9.16.
CVE-2024-8680 affects all versions of the MC4WP: Mailchimp for WordPress plugin up to and including 4.9.16.
CVE-2024-8680 is a Stored Cross-Site Scripting (XSS) vulnerability.
Authenticated attackers can exploit CVE-2024-8680 using the admin settings of the plugin.