Overview
- Description
- The ReCaptcha Integration for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Source
- security@wordfence.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Weaknesses
- security@wordfence.com
- CWE-79
Social media
- Hype score
- Not currently trending
CVE Alert: CVE-2024-8739 - https://t.co/bRABTqHg3a #OSINT #ThreatIntel #CyberSecurity #cve_2024_8739
@RedPacketSec
3 Nov 2024
81 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-8739 Reflected XSS Vulnerability in WordPress ReCaptcha Plugin ≤ 1.2.5 The ReCaptcha Integration for WordPress plugin up to version 1.2.5 is vulnerable to Reflected Cross-Site Scripting (XSS). This happe... https://t.co/YHeTZhMb6E
@VulmonFeeds
2 Nov 2024
84 Impressions
1 Retweet
1 Like
1 Bookmark
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:wedevs:recaptcha_integration:*:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "4E1C5ABE-ABC2-4B20-BE46-46ECFC2CEDF0", "versionEndExcluding": "1.2.6" } ], "operator": "OR" } ] } ]