The Animated Headline plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'animated-headline' shortcode in all versions up to, and including, 4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Configurations
No configuration.
History
08 Apr 2026, 18:21
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-79 |
21 Nov 2024, 09:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://wordpress.org/plugins/animated-headline/ - | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/6f589b5d-9cdb-4521-bc60-c8f19d0ef982?source=cve - | |
| Summary |
|
20 Mar 2024, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-03-20 07:15
Updated : 2026-04-15 00:35
NVD link : CVE-2024-2304
Mitre link : CVE-2024-2304
CVE.ORG link : CVE-2024-2304
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
