- Description
- The MagicPost plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wb_share_social shortcode in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Source
- security@wordfence.com
- NVD status
- Received
CVSS 3.1
- Type
- Primary
- Base score
- 6.4
- Impact score
- 2.7
- Exploitability score
- 3.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
- security@wordfence.com
- CWE-79
- Hype score
- Not currently trending
CVE Alert: CVE-2024-12591 - https://t.co/aAYnKEUSxb #OSINT #ThreatIntel #CyberSecurity #cve_2024_12591
@RedPacketSec
22 Dec 2024
80 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-12591 Stored XSS Vulnerability in MagicPost WordPress Plugin via Shortcode The MagicPost plugin for WordPress has a Stored Cross-Site Scripting (XSS) vulnerability. This issue affects all versions up to ... https://t.co/FyiPQgYhVV
@VulmonFeeds
21 Dec 2024
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-12591 The MagicPost plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wb_share_social shortcode in all versions up to, and including, 1.2.1… https://t.co/nSlweEDCB5
@CVEnew
21 Dec 2024
497 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes