CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-11645

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.0001/1

CVE-2024-11645 affects the float block WordPress plugin, potentially allowing Cross-Site Scripting (XSS) attacks. A high-privilege user, like an administrator, could inject malicious scripts into the plugin's settings. This vulnerability exists because the plugin doesn't properly sanitize and escape certain settings. Even with unfiltered_html capabilities disabled, this attack is still possible, especially in multisite WordPress setups. The risk includes website compromise, data theft, or malicious redirects. Although the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 30, indicating a low level of risk, despite being tagged as "In The Wild", meaning it's been observed being exploited. Addressing this vulnerability is important to maintain the integrity of your WordPress site and prevent unauthorized actions.

In The Wild
2024-12-27

2024-12-27
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-11645 affects the Float Block WordPress plugin versions up to 1.7. This vulnerability allows high-privilege users, such as administrators, to execute Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disabled, potentially compromising the website and its users. While the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 30, indicating a moderate risk that warrants attention and mitigation.

Key Insights

  • Stored XSS: This vulnerability enables attackers to inject malicious JavaScript code into the website's database, which is then executed by unsuspecting users when they visit the affected page. This code could steal sensitive information, redirect users to malicious websites, or even take control of the website itself.
  • High Privilege Users: The vulnerability exploits the privileges of high-level users, such as administrators. This means attackers could exploit the vulnerability by compromising an admin account or exploiting other vulnerabilities that grant them admin privileges.
  • Multisite Setup: The vulnerability is particularly relevant in multisite setups, as it bypasses security mechanisms meant to prevent XSS attacks in such environments.

Mitigation Strategies

  • Update the Plugin: Immediately update the Float Block plugin to version 1.8 or later, as this version addresses the vulnerability.
  • Disable Unfiltered HTML: If possible, disable the unfiltered_html capability for all users who do not require it. This helps to prevent XSS attacks by limiting the ability of users to inject arbitrary HTML code into the website.
  • Implement a Web Application Firewall (WAF): A WAF can help to detect and block XSS attacks by analyzing incoming traffic and filtering out malicious requests.
  • Regularly Scan for Vulnerabilities: Conduct regular vulnerability scans of your website to identify and remediate any potential weaknesses.

Additional Information:

If you have additional questions about this specific vulnerability or require further assistance, please use the 'Ask to Analyst' feature on SOCRadar, contact us directly, or open a support ticket for more information.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-11645 | Float Block Plugin up to 1.7 on WordPress Setting cross site scripting
vuldb.com2025-02-16
CVE-2024-11645 | Float Block Plugin up to 1.7 on WordPress Setting cross site scripting | A vulnerability, which was classified as problematic, was found in Float Block Plugin up to 1.7 on WordPress. This affects an unknown part of the component Setting Handler. The manipulation leads to cross site scripting. This vulnerability is uniquely identified as CVE-2024-11645. It is possible to initiate
vuldb.com
rss
forum
news

Social Media

CVE-2024-11645 The float block WordPress plugin through 1.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks ev... https://t.co/rFWnrGtfp0
0
0
0
CVE-2024-11645 The float block WordPress plugin through 1.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored… https://t.co/bs6y8BkuLS
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://wpscan.com/vulnerability/7771a76b-bc8c-426f-a125-5bd74ccf2845/
134C704F-9B21-4F2E-91B3-4A467353BCC0https://wpscan.com/vulnerability/7771a76b-bc8c-426f-a125-5bd74ccf2845/
[email protected]https://wpscan.com/vulnerability/7771a76b-bc8c-426f-a125-5bd74ccf2845/
GITHUBhttps://wpscan.com/vulnerability/7771a76b-bc8c-426f-a125-5bd74ccf2845/

CWE Details

No CWE details found for this CVE

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence