The tagDiv Composer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘envato_code[]’ parameter in all versions up to, and including, 5.0 due to insufficient input sanitization and output escaping within the on_ajax_register_forum_user function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
References
Link | Resource |
---|---|
https://tagdiv.com/newspaper/ | Not Applicable |
https://www.wordfence.com/threat-intel/vulnerabilities/id/db95415a-5354-498b-8368-58c47d9948de?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-08-31 05:15
Updated : 2024-09-03 20:45
NVD link : CVE-2024-5212
Mitre link : CVE-2024-5212
CVE.ORG link : CVE-2024-5212
JSON object : View
Products Affected
tagdiv
- tagdiv_composer
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')