The Watu Quiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'watu-basic-chart' shortcode in all versions up to, and including, 3.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Configurations
History
17 Jul 2025, 17:06
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
First Time |
Kibokolabs
Kibokolabs watu Quiz |
|
References | () https://plugins.trac.wordpress.org/changeset/3036986/ - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/c31732fa-eb35-4932-bee6-08955a14b010?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:kibokolabs:watu_quiz:*:*:*:*:*:wordpress:*:* |
Information
Published : 2024-04-09 19:15
Updated : 2025-07-17 17:06
NVD link : CVE-2024-0873
Mitre link : CVE-2024-0873
CVE.ORG link : CVE-2024-0873
JSON object : View
Products Affected
kibokolabs
- watu_quiz
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')