CVE-2024-10710

The YaDisk Files WordPress plugin through 1.2.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:antongorodezkiy:yadisk_files:*:*:*:*:*:wordpress:*:*

History

15 May 2025, 15:38

Type Values Removed Values Added
First Time Antongorodezkiy yadisk Files
Antongorodezkiy
CPE cpe:2.3:a:antongorodezkiy:yadisk_files:*:*:*:*:*:wordpress:*:*
CWE CWE-79
References () https://wpscan.com/vulnerability/165ab698-c8b5-4412-a621-c5365d621fc5/ - () https://wpscan.com/vulnerability/165ab698-c8b5-4412-a621-c5365d621fc5/ - Exploit, Third Party Advisory

25 Nov 2024, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.5
Summary
  • (es) El complemento YaDisk Files para WordPress hasta la versión 1.2.5 no desinfecta ni escapa a algunas de sus configuraciones, lo que podría permitir que usuarios con privilegios elevados como el administrador realicen ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo, en una configuración de varios sitios).

25 Nov 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-25 06:15

Updated : 2025-05-15 15:38


NVD link : CVE-2024-10710

Mitre link : CVE-2024-10710

CVE.ORG link : CVE-2024-10710


JSON object : View

Products Affected

antongorodezkiy

  • yadisk_files
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')