- Description
- The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the disqus_name parameter in all versions up to, and including, 1.1.1 due to insufficient input validation. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Source
- security@wordfence.com
- NVD status
- Received
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
- security@wordfence.com
- CWE-79
- Hype score
- Not currently trending
🚨 CVE-2024-11254 (Published: 2024-12-18) - A critical vulnerability in the WordPress Plugin Directory affects versions of the Accelerated Mobile Pages plugin. 🛠️ Remediation: Update to the latest version to secure your site! More info: [WordPress Plugin](https://t.co/OaQcSFBglw
@transilienceai
19 Dec 2024
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-11254 The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the disqus_name parameter in all versions up to, an… https://t.co/we9tpnYzQg
@CVEnew
18 Dec 2024
438 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes