Description
The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Fri, 11 Apr 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Iptanus
Iptanus wordpress File Upload |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Iptanus
Iptanus wordpress File Upload |
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-06T14:52:56.919Z
Reserved: 2024-07-10T12:38:13.665Z
Link: CVE-2024-6651
Updated: 2024-08-06T14:52:45.977Z
Status : Analyzed
Published: 2024-08-06T06:15:35.973
Modified: 2025-04-11T15:13:49.117
Link: CVE-2024-6651
No data.
OpenCVE Enrichment
No data.
Weaknesses