The Tracking Code Manager WordPress plugin before 2.4.0 does not sanitise and escape some of its metabox settings when outputing them in the page, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks.
History

Mon, 12 May 2025 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Data443
Data443 tracking Code Manager
Weaknesses CWE-79
CPEs cpe:2.3:a:data443:tracking_code_manager:*:*:*:*:*:wordpress:*:*
Vendors & Products Data443
Data443 tracking Code Manager

Thu, 30 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Jan 2025 06:15:00 +0000

Type Values Removed Values Added
Description The Tracking Code Manager WordPress plugin before 2.4.0 does not sanitise and escape some of its metabox settings when outputing them in the page, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks.
Title Tracking Code Manager < 2.4.0 - Contributor+ Stored XSS
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2025-01-30T06:00:05.682Z

Updated: 2025-01-30T16:09:08.050Z

Reserved: 2024-10-23T17:04:34.068Z

Link: CVE-2024-10309

cve-icon Vulnrichment

Updated: 2025-01-30T16:09:03.587Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-30T06:15:28.827

Modified: 2025-05-11T23:38:49.507

Link: CVE-2024-10309

cve-icon Redhat

No data.