CVE-2024-1759

The WP ULike – Most Advanced WordPress Marketing Toolkit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a user's display name in all versions up to, and including, 4.6.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:*

History

05 Mar 2025, 15:11

Type Values Removed Values Added
CWE CWE-79
CPE cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:*
First Time Wpulike
Wpulike wp Ulike
References () https://plugins.trac.wordpress.org/changeset/3052611/wp-ulike/trunk/admin/classes/class-wp-ulike-widget.php - () https://plugins.trac.wordpress.org/changeset/3052611/wp-ulike/trunk/admin/classes/class-wp-ulike-widget.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/d844ca83-84e5-4b6c-ae26-f300c7328d78?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/d844ca83-84e5-4b6c-ae26-f300c7328d78?source=cve - Third Party Advisory

Information

Published : 2024-05-02 17:15

Updated : 2025-03-05 15:11


NVD link : CVE-2024-1759

Mitre link : CVE-2024-1759

CVE.ORG link : CVE-2024-1759


JSON object : View

Products Affected

wpulike

  • wp_ulike
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')