cvelist/2024/5xxx/CVE-2024-5004.json

80 lines
2.4 KiB
JSON
Raw Normal View History

2024-05-16 14:00:34 +00:00
{
2024-07-22 06:00:35 +00:00
"data_version": "4.0",
2024-05-16 14:00:34 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-5004",
2024-07-22 06:00:35 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2024-05-16 14:00:34 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-07-22 06:00:35 +00:00
"value": "The CM Popup Plugin for WordPress WordPress plugin before 1.6.6 does not sanitise and escape some of the campaign settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-Site Scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "CM Popup Plugin for WordPress ",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.6.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/4bea7baa-84a2-4b21-881c-4f17822329e7/",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/4bea7baa-84a2-4b21-881c-4f17822329e7/"
2024-05-16 14:00:34 +00:00
}
]
2024-07-22 06:00:35 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Felipe Caon"
},
{
"lang": "en",
"value": "WPScan"
}
]
2024-05-16 14:00:34 +00:00
}