Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Apr 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Technowich
Technowich wp Ulike |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Technowich
Technowich wp Ulike |
Wed, 06 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpulike
Wpulike wp Ulike |
|
| CPEs | cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpulike
Wpulike wp Ulike |
|
| Metrics |
cvssV3_1
|
Wed, 06 Nov 2024 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WP ULike WordPress plugin before 4.7.5 does not sanitise and escape some of its settings, which could allow high privilege users such as editors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed | |
| Title | WP ULike < 4.7.5 - Admin+ Stored XSS via Widgets | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-11-06T15:51:51.920Z
Reserved: 2024-08-16T12:54:24.448Z
Link: CVE-2024-7879
Updated: 2024-11-06T15:51:46.875Z
Status : Analyzed
Published: 2024-11-06T06:15:03.813
Modified: 2025-04-11T15:06:02.317
Link: CVE-2024-7879
No data.
OpenCVE Enrichment
No data.