The WordPress/Plugin Upgrade Time Out Plugin WordPress plugin through 1.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/8e1e2d8d-41aa-49bc-95d5-dae75be788d5/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
22 Apr 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
First Time |
Felixker
Felixker wordpress\/plugin Upgrade Time Out Plugin |
|
CPE | cpe:2.3:a:felixker:wordpress\/plugin_upgrade_time_out_plugin:*:*:*:*:*:wordpress:*:* | |
References | () https://wpscan.com/vulnerability/8e1e2d8d-41aa-49bc-95d5-dae75be788d5/ - Exploit, Third Party Advisory | |
CWE | CWE-352 |
09 Apr 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
09 Apr 2025, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-09 06:15
Updated : 2025-04-22 17:15
NVD link : CVE-2024-8243
Mitre link : CVE-2024-8243
CVE.ORG link : CVE-2024-8243
JSON object : View
Products Affected
felixker
- wordpress\/plugin_upgrade_time_out_plugin
CWE
CWE-352
Cross-Site Request Forgery (CSRF)