Description
WordPress Core is vulnerable to Stored Cross-Site Scripting via the HTML API in various versions prior to 6.5.5 due to insufficient input sanitization and output escaping on URLs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4358-1 | wordpress security update |
Debian DSA |
DSA-6075-1 | wordpress security update |
EUVD |
EUVD-2024-47423 | WordPress Core is vulnerable to Stored Cross-Site Scripting via the HTML API in various versions prior to 6.5.5 due to insufficient input sanitization and output escaping on URLs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
References
History
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T21:33:05.534Z
Reserved: 2024-06-25T11:09:22.494Z
Link: CVE-2024-6307
Updated: 2024-08-01T21:33:05.534Z
Status : Deferred
Published: 2024-06-25T11:15:50.820
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-6307
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
Debian DLA
Debian DSA
EUVD