The tagDiv Composer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘envato_code[]’ parameter in all versions up to, and including, 5.0 due to insufficient input sanitization and output escaping within the on_ajax_check_envato_code function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
References
Link | Resource |
---|---|
https://tagdiv.com/newspaper/ | Not Applicable |
https://www.wordfence.com/threat-intel/vulnerabilities/id/ed9db9c1-c6b5-459e-9820-ec4ee47b244e?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-08-31 05:15
Updated : 2024-09-03 18:48
NVD link : CVE-2024-3886
Mitre link : CVE-2024-3886
CVE.ORG link : CVE-2024-3886
JSON object : View
Products Affected
tagdiv
- tagdiv_composer
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')