CVE-2024-10146

The Simple File List WordPress plugin before 6.1.13 does not sanitise and escape a generated URL before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against admins.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:simplefilelist:simple_file_list:*:*:*:*:*:wordpress:*:*

History

15 May 2025, 16:29

Type Values Removed Values Added
CWE CWE-79
First Time Simplefilelist simple File List
Simplefilelist
References () https://wpscan.com/vulnerability/9ee74a0f-83ff-4c15-a114-f8f6baab8bf5/ - () https://wpscan.com/vulnerability/9ee74a0f-83ff-4c15-a114-f8f6baab8bf5/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:simplefilelist:simple_file_list:*:*:*:*:*:wordpress:*:*

Information

Published : 2024-11-14 06:15

Updated : 2025-05-15 16:29


NVD link : CVE-2024-10146

Mitre link : CVE-2024-10146

CVE.ORG link : CVE-2024-10146


JSON object : View

Products Affected

simplefilelist

  • simple_file_list
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')