The DL Robots.txt WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
History

Tue, 20 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 May 2025 20:15:00 +0000

Type Values Removed Values Added
Description The DL Robots.txt WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Title DL Robots.txt <= 1.2 - Admin+ Stored XSS
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2025-05-15T20:07:10.175Z

Updated: 2025-05-20T19:21:08.782Z

Reserved: 2024-07-16T18:50:32.651Z

Link: CVE-2024-6797

cve-icon Vulnrichment

Updated: 2025-05-19T20:25:39.948Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2025-05-15T20:15:56.357

Modified: 2025-05-20T20:15:39.137

Link: CVE-2024-6797

cve-icon Redhat

No data.