The Bulk Me Now! WordPress plugin through 2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
History

Mon, 12 May 2025 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Ombu
Ombu bulk Me Now\!
Weaknesses CWE-79
CPEs cpe:2.3:a:ombu:bulk_me_now\!:*:*:*:*:*:wordpress:*:*
Vendors & Products Ombu
Ombu bulk Me Now\!

Thu, 30 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Jan 2025 06:15:00 +0000

Type Values Removed Values Added
Description The Bulk Me Now! WordPress plugin through 2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Title Bulk Me Now <= 2.0 - Reflected XSS
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2025-01-30T06:00:09.593Z

Updated: 2025-01-30T15:48:21.121Z

Reserved: 2024-12-14T20:18:39.028Z

Link: CVE-2024-12638

cve-icon Vulnrichment

Updated: 2025-01-30T15:48:13.565Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-30T06:15:29.333

Modified: 2025-05-11T23:41:24.737

Link: CVE-2024-12638

cve-icon Redhat

No data.