2024-05-10 15:00:35 +00:00
{
2024-06-25 06:00:36 +00:00
"data_version" : "4.0" ,
2024-05-10 15:00:35 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2024-4757" ,
2024-06-25 06:00:36 +00:00
"ASSIGNER" : "contact@wpscan.com" ,
"STATE" : "PUBLIC"
2024-05-10 15:00:35 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2024-06-25 06:00:36 +00:00
"value" : "The Logo Manager For Enamad WordPress plugin through 0.7.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack"
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
} ,
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-79 Cross-Site Scripting (XSS)"
}
]
2024-05-10 15:00:35 +00:00
}
]
2024-06-25 06:00:36 +00:00
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Unknown" ,
"product" : {
"product_data" : [
{
"product_name" : "Logo Manager For Enamad" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"status" : "affected" ,
"versionType" : "semver" ,
"version" : "0" ,
"lessThanOrEqual" : "0.7.0"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://wpscan.com/vulnerability/b54b55e0-b184-4c90-ba94-feda0997bf2a/" ,
"refsource" : "MISC" ,
"name" : "https://wpscan.com/vulnerability/b54b55e0-b184-4c90-ba94-feda0997bf2a/"
}
]
} ,
"generator" : {
"engine" : "WPScan CVE Generator"
} ,
"source" : {
"discovery" : "EXTERNAL"
} ,
"credits" : [
{
"lang" : "en" ,
"value" : "Bob Matyas"
} ,
{
"lang" : "en" ,
"value" : "WPScan"
}
]
2024-05-10 15:00:35 +00:00
}