CVE-2024-10146

The Simple File List WordPress plugin before 6.1.13 does not sanitise and escape a generated URL before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against admins.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:simplefilelist:simple_file_list:*:*:*:*:*:wordpress:*:*

History

15 May 2025, 16:29

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/9ee74a0f-83ff-4c15-a114-f8f6baab8bf5/ - () https://wpscan.com/vulnerability/9ee74a0f-83ff-4c15-a114-f8f6baab8bf5/ - Exploit, Third Party Advisory
CWE CWE-79
CPE cpe:2.3:a:simplefilelist:simple_file_list:*:*:*:*:*:wordpress:*:*
First Time Simplefilelist simple File List
Simplefilelist

14 Nov 2024, 19:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
Summary
  • (es) El complemento Simple File List de WordPress anterior a la versión 6.1.13 no desinfecta ni escapa una URL generada antes de mostrarla nuevamente en un atributo, lo que genera un Cross-Site Scripting reflejado que podría usarse contra los administradores.

14 Nov 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-14 06:15

Updated : 2025-05-15 16:29


NVD link : CVE-2024-10146

Mitre link : CVE-2024-10146

CVE.ORG link : CVE-2024-10146


JSON object : View

Products Affected

simplefilelist

  • simple_file_list
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')