CVE-2024-2967

The Guest posting / Frontend Posting wordpress plugin – WP Front User Submit / Front Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form settings in all versions up to, and including, 4.4.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Configurations

No configuration.

History

08 Apr 2026, 18:21

Type Values Removed Values Added
CWE CWE-79
References
  • () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3098586%40front-editor%2Ftrunk&old=3097587%40front-editor%2Ftrunk&sfp_email=&sfph_mail= -
Summary (en) The Guest posting / Frontend Posting wordpress plugin – WP Front User Submit / Front Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form settings in all versions up to, and including, 4.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. (en) The Guest posting / Frontend Posting wordpress plugin – WP Front User Submit / Front Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form settings in all versions up to, and including, 4.4.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

21 Nov 2024, 09:10

Type Values Removed Values Added
References () https://wordpress.org/plugins/front-editor/ - () https://wordpress.org/plugins/front-editor/ -
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/82eb759f-e8d5-40c6-998f-f6981d9d6644?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/82eb759f-e8d5-40c6-998f-f6981d9d6644?source=cve -
Summary
  • (es) El complemento Guest posting / Frontend Posting wordpress plugin – WP Front User Submit / Front Editor para WordPress es vulnerable a Cross-Site Scripting Almacenado a través de la configuración del formulario en todas las versiones hasta la 4.4.1 incluida debido a una sanitización de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html.

02 May 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-02 17:15

Updated : 2026-04-15 00:35


NVD link : CVE-2024-2967

Mitre link : CVE-2024-2967

CVE.ORG link : CVE-2024-2967


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')