First published: Thu Sep 26 2024(Updated: )
The Bulk NoIndex & NoFollow Toolkit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.15. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mad Fish Digital Bulk NoIndex & NoFollow Toolkit | <2.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8803 is classified as a high severity vulnerability due to exposure to reflected cross-site scripting attacks.
To fix CVE-2024-8803, update the Bulk NoIndex & NoFollow Toolkit plugin to version 2.16 or later.
All users of the Bulk NoIndex & NoFollow Toolkit plugin for WordPress prior to version 2.16 are affected by CVE-2024-8803.
CVE-2024-8803 allows unauthenticated attackers to perform reflected cross-site scripting attacks.
Yes, CVE-2024-8803 is present in all versions of the Bulk NoIndex & NoFollow Toolkit plugin up to and including version 2.15.