The If-So Dynamic Content Personalization WordPress plugin before 1.8.0.4 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/eb3f24a7-3171-42c3-9016-e29da4f384fa/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/eb3f24a7-3171-42c3-9016-e29da4f384fa/ | Exploit Third Party Advisory |
Configurations
History
20 May 2025, 18:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
If-so if-so
If-so |
|
CWE | CWE-79 | |
References | () https://wpscan.com/vulnerability/eb3f24a7-3171-42c3-9016-e29da4f384fa/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:if-so:if-so:*:*:*:*:*:wordpress:*:* |
Information
Published : 2024-07-13 06:15
Updated : 2025-05-20 18:19
NVD link : CVE-2024-5713
Mitre link : CVE-2024-5713
CVE.ORG link : CVE-2024-5713
JSON object : View
Products Affected
if-so
- if-so
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')