WPForms Plugin har 1.9.2.2 ka WordPress Setting Cross Site Scripting

CVSS Meta Temp ScoreGarga na exploit ndiyam (≈)CTI Nganji Score
3.5$0-$5k0.00

Gundumabayani

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin WPForms Plugin har 1.9.2.2 on WordPress. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, $software_file na cikin fayil, Setting Handler na cikin sashi. Ngam manipulation shi Cross Site Scripting. Wannan rauni ana sayar da shi da suna CVE-2024-11223. Ngam yiɗi ka a tuma ndiyam ka nder waya. Ba exploit ɗin da ake da shi. Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a hokkata. If you want to get best quality of vulnerability data, you may have to visit VulDB.

Furɗebayani

Wuro vulnerability wey an yi classify sey karshewa an gano shi a cikin WPForms Plugin har 1.9.2.2 on WordPress. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, $software_file na cikin fayil, Setting Handler na cikin sashi. Ngam manipulation shi Cross Site Scripting. CWE shidin ka a yi bayani matsala sai ya kai CWE-79. Gaskiya, laifi an fitar da shi ta Dmitrii Ignatyev. Advisory ɗin ana rabawa don saukewa a wpscan.com.

Wannan rauni ana sayar da shi da suna CVE-2024-11223. CVE assignement 11/14/2024 gangan shikena. Ngam yiɗi ka a tuma ndiyam ka nder waya. Tekinikal bayani ba ga. Wannan vulnerability ɗin ba shi da yawa sosai. Ba exploit ɗin da ake da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam.

Á wúro a wondi feere.

Ngamdi ka a yiɗi a ɗaɓɓita kompona wey ka a hokkata.

If you want to get best quality of vulnerability data, you may have to visit VulDB.

Kayanbayani

Nganji

Sunu

Furɗe

CPE 2.3bayani

CPE 2.2bayani

CVSSv4bayani

VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

CVSSv3bayani

VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.5

VulDB Ganda Borno: 2.4
VulDB Temp Score: 2.3
VulDB Furɗo: 🔍
VulDB Gaskiya: 🔍

CNA Ganda Borno: 4.7
CNA Furɗo (WPScan): 🔍

CVSSv2bayani

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VektarKumpleksitiAuthentisierungKariyandiGaskiyaGashina
furufurufurufurufurufuru
furufurufurufurufurufuru
furufurufurufurufurufuru

VulDB Ganda Borno: 🔍
VulDB Temp Score: 🔍
VulDB Gaskiya: 🔍

Gargajiyabayani

Klasu: Cross Site Scripting
CWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍

Fizikal: Ayi
Gumti: Ayi
Gana: Ee

Gashina: 🔍
Halitta: A wondi feere

EPSS Score: 🔍
EPSS Percentile: 🔍

Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔍

0-Dayfurufurufurufuru
Lalefurufurufurufuru

Bayani na barazanabayani

Ngam: 🔍
Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍

Kari gamjibayani

Garga: Gargajiya
Halitta: 🔍

0-Day Gana: 🔍

Gargajiya: WPForms Plugin 1.9.2.3

Waktin layibayani

11/14/2024 🔍
12/26/2024 +42 Hənde 🔍
12/26/2024 +0 Hənde 🔍
02/16/2025 +52 Hənde 🔍

Ngizimbayani

Gargaaji: wpscan.com
Ngamti: Dmitrii Ignatyev
Halitta: Gaskiya

CVE: CVE-2024-11223 (🔍)
GCVE (CVE): GCVE-0-2024-11223
GCVE (VulDB): GCVE-100-289322

Gumtibayani

Súgá: 12/26/2024 08:29
Gargadi: 02/16/2025 18:14
Goyarwa: 12/26/2024 08:29 (57), 12/30/2024 19:24 (12), 02/16/2025 18:14 (3)
Gadankam: 🔍
Cache ID: 253:4CC:103

Ganaaji

A ga wuroyo kulu. Kàlàmbe: kr + en.

Ngam loga ka, kanyi shidin dum.

Do you know our Splunk app?

Download it now for free!