CVE-2024-3230
CVE-2024-3230: WordPress Download Attachments plugin vulnerable to Stored Cross-Site Scripting (XSS). This allows authenticated attackers with contributor access or higher to inject malicious web scripts into pages using the 'download-attachments' shortcode. The vulnerability exists due to inadequate input sanitization and output escaping of user-supplied attributes in versions up to 1.3.
While the CVSS score is 0, indicating no immediate risk per that system, the SOCRadar Vulnerability Risk Score (SVRS) is 30. This suggests a moderate level of concern and warrants investigation. Successful exploitation enables attackers to execute arbitrary JavaScript in a victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites. The 'In The Wild' tag indicates that exploitation attempts have been observed, heightening the importance of patching or mitigating this security risk. This highlights the need for users to update the plugin to a patched version to prevent potential security breaches.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.