CVE-2024-5177

The Hash Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' parameter within multiple widgets in all versions up to, and including, 1.3.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hashthemes:hash_elements:*:*:*:*:*:wordpress:*:*

History

05 Jun 2025, 20:39

Type Values Removed Values Added
CPE cpe:2.3:a:hashthemes:hash_elements:*:*:*:*:*:wordpress:*:*
First Time Hashthemes hash Elements
Hashthemes
CWE CWE-79
References () https://plugins.trac.wordpress.org/browser/hash-elements/trunk/modules/news-module-one/widgets/news-module-one.php#L720 - () https://plugins.trac.wordpress.org/browser/hash-elements/trunk/modules/news-module-one/widgets/news-module-one.php#L720 - Product
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3090981%40hash-elements%2Ftrunk&old=3089165%40hash-elements%2Ftrunk&sfp_email=&sfph_mail=#file18 - () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3090981%40hash-elements%2Ftrunk&old=3089165%40hash-elements%2Ftrunk&sfp_email=&sfph_mail=#file18 - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/9ba07137-f834-4f56-bcd5-0f6fde756681?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/9ba07137-f834-4f56-bcd5-0f6fde756681?source=cve - Third Party Advisory

Information

Published : 2024-05-23 06:15

Updated : 2025-06-05 20:39


NVD link : CVE-2024-5177

Mitre link : CVE-2024-5177

CVE.ORG link : CVE-2024-5177


JSON object : View

Products Affected

hashthemes

  • hash_elements
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')