7.2
CVE-2024-5902
- EPSS 3.51%
- Veröffentlicht 12.07.2024 22:15:02
- Zuletzt bearbeitet 10.07.2025 18:14:44
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
UserFeedback Lite <= 1.0.15 - Unauthenticated Stored Cross-Site Scripting via Name Parameter
The User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the name parameter in all versions up to, and including, 1.0.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in feedback form responses that will execute whenever a high-privileged user tries to view them.
Mögliche Gegenmaßnahme
User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds: Update to version 1.0.16, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds
Version
*-1.0.15
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Monsterinsights ≫ Userfeedback SwEditionlite SwPlatformwordpress Version < 1.0.16
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 3.51% | 0.872 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
| security@wordfence.com | 7.2 | 3.9 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.