CVE-2024-0559

The Enhanced Text Widget WordPress plugin before 1.6.6 does not validate and escape some of its Widget options before outputting them back in attributes, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Configurations

Configuration 1 (hide)

cpe:2.3:a:inisev:enhanced_text_widget:*:*:*:*:*:wordpress:*:*

History

01 Apr 2025, 15:22

Type Values Removed Values Added
CWE CWE-79
References () https://research.cleantalk.org/cve-2024-0559/ - () https://research.cleantalk.org/cve-2024-0559/ - Exploit, Third Party Advisory
References () https://wpscan.com/vulnerability/b257daf2-9540-4a0f-a560-54b47d2b913f/ - () https://wpscan.com/vulnerability/b257daf2-9540-4a0f-a560-54b47d2b913f/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:inisev:enhanced_text_widget:*:*:*:*:*:wordpress:*:*
First Time Inisev
Inisev enhanced Text Widget

20 Mar 2025, 19:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

Information

Published : 2024-03-11 18:15

Updated : 2025-04-01 15:37


NVD link : CVE-2024-0559

Mitre link : CVE-2024-0559

CVE.ORG link : CVE-2024-0559


JSON object : View

Products Affected

inisev

  • enhanced_text_widget
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')