cve/2024/CVE-2024-10076.md
2025-09-29 16:08:36 +00:00

20 lines
1.0 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-10076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10076)
![](https://img.shields.io/static/v1?label=Product&message=Jetpack%20Boost&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Jetpack&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2013.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%203.4.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Jetpack WordPress plugin before 13.8, Jetpack Boost WordPress plugin before 3.4.8 use regexes in the Site Accelerator features when switching image URLs to their CDN counterpart. Unfortunately, some of them may match patterns it shouldnt, ultimately making it possible for contributor and above users to perform Stored XSS attacks
### POC
#### Reference
- https://wpscan.com/vulnerability/15f278f6-0418-4c83-b925-b1a2d8c53e2f/
#### Github
No PoCs found on GitHub currently.