CVE-2024-10709

The YaDisk Files WordPress plugin through 1.2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:antongorodezkiy:yadisk_files:*:*:*:*:*:wordpress:*:*

History

15 May 2025, 15:43

Type Values Removed Values Added
CPE cpe:2.3:a:antongorodezkiy:yadisk_files:*:*:*:*:*:wordpress:*:*
CWE CWE-79
First Time Antongorodezkiy yadisk Files
Antongorodezkiy
References () https://wpscan.com/vulnerability/114aeaf7-32a5-4510-a497-92cc0951b022/ - () https://wpscan.com/vulnerability/114aeaf7-32a5-4510-a497-92cc0951b022/ - Exploit, Third Party Advisory

25 Nov 2024, 21:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
Summary
  • (es) El complemento YaDisk Files para WordPress hasta la versión 1.2.5 no valida ni escapa algunos de sus atributos de código corto antes de mostrarlos nuevamente en una página/publicación donde está incrustado el código corto, lo que podría permitir a los usuarios con el rol de colaborador y superior realizar ataques de cross-site scripting almacenado.

25 Nov 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-25 06:15

Updated : 2025-05-15 15:43


NVD link : CVE-2024-10709

Mitre link : CVE-2024-10709

CVE.ORG link : CVE-2024-10709


JSON object : View

Products Affected

antongorodezkiy

  • yadisk_files
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')