First published: Tue Nov 05 2024(Updated: )
The Seriously Simple Podcasting plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.5.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Seriously Simple Podcasting | <3.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9667 has a medium severity rating due to the potential for unauthenticated attackers to exploit the vulnerability.
To fix CVE-2024-9667, update the Seriously Simple Podcasting plugin to version 3.6.0 or later.
CVE-2024-9667 affects all versions of the Seriously Simple Podcasting plugin up to and including 3.5.0.
CVE-2024-9667 is a Reflected Cross-Site Scripting vulnerability.
CVE-2024-9667 can be exploited by unauthenticated users, making it a higher risk.