CVE-2024-0903
CVE-2024-0903: Stored Cross-Site Scripting (XSS) Vulnerability in WordPress User Feedback Plugin. This vulnerability allows unauthenticated attackers to inject arbitrary web scripts into the feedback submission page, potentially compromising user accounts. The WordPress User Feedback plugin, versions 1.0.13 and below, is susceptible due to insufficient input sanitization and output escaping. The CVSS score is 6.1, indicating a medium severity, but with an SVRS of 30, it suggests a lower immediate risk compared to vulnerabilities with higher SVRS scores. However, successful exploitation can lead to account takeover and malicious redirects. While the SVRS indicates less immediate danger, patching is still crucial to prevent potential exploitation. The presence of "In The Wild" tag indicates active exploitation attempts and highlights the need for immediate update to address the XSS issue. This stored XSS vulnerability could be exploited when a user interacts with the crafted link in the feedback submission, leading to unauthorized actions.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.