CVE-2024-12872

The Zalomení WordPress plugin through 1.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Configurations

Configuration 1 (hide)

cpe:2.3:a:honzaskypala:zalomeni:*:*:*:*:*:wordpress:*:*

History

23 May 2025, 15:59

Type Values Removed Values Added
Summary
  • (es) El complemento Zalomení para WordPress hasta la versión 1.5 no desinfecta ni escapa a algunas de sus configuraciones, lo que podría permitir que usuarios con privilegios elevados como el administrador realicen ataques Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo en una configuración multisitio).
CPE cpe:2.3:a:honzaskypala:zalomeni:*:*:*:*:*:wordpress:*:*
First Time Honzaskypala zalomeni
Honzaskypala
CWE CWE-79
References () https://wpscan.com/vulnerability/a8a706c6-7f0f-4148-9f6f-40c0ca95dd9a/ - () https://wpscan.com/vulnerability/a8a706c6-7f0f-4148-9f6f-40c0ca95dd9a/ - Exploit, Third Party Advisory

31 Jan 2025, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.8
References () https://wpscan.com/vulnerability/a8a706c6-7f0f-4148-9f6f-40c0ca95dd9a/ - () https://wpscan.com/vulnerability/a8a706c6-7f0f-4148-9f6f-40c0ca95dd9a/ -

31 Jan 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-31 06:15

Updated : 2025-05-23 15:59


NVD link : CVE-2024-12872

Mitre link : CVE-2024-12872

CVE.ORG link : CVE-2024-12872


JSON object : View

Products Affected

honzaskypala

  • zalomeni
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')