CVE-2024-7084

The Ajax Search Lite WordPress plugin before 4.12.1 does not sanitise and escape some parameters, which could allow users with a role as low as Admin+ to perform Cross-Site Scripting attacks.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wp-dreams:ajax_search:*:*:*:*:lite:wordpress:*:*

History

28 May 2025, 19:41

Type Values Removed Values Added
CPE cpe:2.3:a:wp-dreams:ajax_search:*:*:*:*:lite:wordpress:*:*
References () https://wpscan.com/vulnerability/0d38bf4d-de6a-49f8-be69-fa483fa61bb7/ - () https://wpscan.com/vulnerability/0d38bf4d-de6a-49f8-be69-fa483fa61bb7/ - Exploit, Third Party Advisory
CWE CWE-79
First Time Wp-dreams
Wp-dreams ajax Search

01 Nov 2024, 21:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.8

06 Aug 2024, 16:30

Type Values Removed Values Added
Summary
  • (es) El complemento Ajax Search Lite de WordPress anterior a 4.12.1 no sanitiza ni escapa a algunos parámetros, lo que podría permitir a los usuarios con un rol tan bajo como Admin+ realizar ataques de Cross-Site Scripting.

06 Aug 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-06 06:15

Updated : 2025-05-28 19:41


NVD link : CVE-2024-7084

Mitre link : CVE-2024-7084

CVE.ORG link : CVE-2024-7084


JSON object : View

Products Affected

wp-dreams

  • ajax_search
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')