First published: Fri Oct 18 2024(Updated: )
The GetResponse Forms by Optin Cat plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.5.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
GetResponse Forms for WordPress | <=2.5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8740 is classified as a medium severity vulnerability due to its potential for reflected cross-site scripting (XSS) attacks.
To fix CVE-2024-8740, update the GetResponse Forms by Optin Cat plugin to version 2.5.7 or later.
Any site using versions of the GetResponse Forms by Optin Cat plugin for WordPress up to and including 2.5.6 is affected by CVE-2024-8740.
CVE-2024-8740 is a reflected cross-site scripting (XSS) vulnerability allowing unauthenticated attackers to execute scripts in the context of an affected site.
Yes, CVE-2024-8740 can be exploited by unauthenticated attackers, making it particularly dangerous.