Lucene search

K
cveWordfenceCVE-2024-8665
HistorySep 13, 2024 - 7:15 a.m.

CVE-2024-8665

2024-09-1307:15:07
CWE-79
Wordfence
web.nvd.nist.gov
24
yith custom login
wordpress
cross-site scripting
url escaping
vulnerability
unauthenticated attackers

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

21.1%

The YITH Custom Login plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.7.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Affected configurations

Vulners
Node
yithemesyith_custom_loginRange1.7.3wordpress
VendorProductVersionCPE
yithemesyith_custom_login*cpe:2.3:a:yithemes:yith_custom_login:*:*:*:*:wordpress:*:*:*

CNA Affected

[
  {
    "vendor": "yithemes",
    "product": "YITH Custom Login",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.7.3",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

21.1%