- Description
- The glomex oEmbed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'glomex_integration' shortcode in all versions up to, and including, 0.9.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Source
- security@wordfence.com
- NVD status
- Received
CVSS 3.1
- Type
- Primary
- Base score
- 6.4
- Impact score
- 2.7
- Exploitability score
- 3.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
- security@wordfence.com
- CWE-79
- Hype score
- Not currently trending
🚨 CVE-2024-11873 (Published: 2024-12-14) - High severity vulnerability in Glomex plugin. Affects versions prior to 0.9.1. Remediation: Update to the latest version to secure your site. For more details, check the code here: https://t.co/3uD1g8aflq #WordPress #Security
@transilienceai
18 Dec 2024
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-11873 The glomex oEmbed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'glomex_integration' shortcode in all versions up to, and includi… https://t.co/cjyhBqzDr4
@CVEnew
14 Dec 2024
222 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-11873 Stored XSS Vulnerability in glomex WordPress oEmbed Plugin The glomex oEmbed plugin for WordPress up to version 0.9.1 has a Stored Cross-Site Scripting (XSS) vulnerability. This issue is in the 'gl... https://t.co/TxVUSS5BCg
@VulmonFeeds
14 Dec 2024
60 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes