CVE-2024-0873

The Watu Quiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'watu-basic-chart' shortcode in all versions up to, and including, 3.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kibokolabs:watu_quiz:*:*:*:*:*:wordpress:*:*

History

17 Jul 2025, 17:06

Type Values Removed Values Added
CWE CWE-79
First Time Kibokolabs
Kibokolabs watu Quiz
References () https://plugins.trac.wordpress.org/changeset/3036986/ - () https://plugins.trac.wordpress.org/changeset/3036986/ - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/c31732fa-eb35-4932-bee6-08955a14b010?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/c31732fa-eb35-4932-bee6-08955a14b010?source=cve - Third Party Advisory
CPE cpe:2.3:a:kibokolabs:watu_quiz:*:*:*:*:*:wordpress:*:*

Information

Published : 2024-04-09 19:15

Updated : 2025-07-17 17:06


NVD link : CVE-2024-0873

Mitre link : CVE-2024-0873

CVE.ORG link : CVE-2024-0873


JSON object : View

Products Affected

kibokolabs

  • watu_quiz
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')