2024-09-12 08:03:16 +00:00
{
"id" : "CVE-2024-5799" ,
"sourceIdentifier" : "contact@wpscan.com" ,
"published" : "2024-09-12T06:15:23.777" ,
2024-09-26 22:03:17 +00:00
"lastModified" : "2024-09-26T20:39:09.127" ,
"vulnStatus" : "Analyzed" ,
2024-09-12 08:03:16 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "The CM Pop-Up Banners for WordPress plugin before 1.7.3 does not sanitise and escape some of its popup fields, which could allow high privilege users such as Contributors to perform Cross-Site Scripting attacks."
2024-09-12 14:03:30 +00:00
} ,
{
"lang" : "es" ,
"value" : "El complemento CM Pop-Up Banners para WordPress anterior a la versi\u00f3n 1.7.3 no desinfecta ni escapa de algunos de sus campos emergentes, lo que podr\u00eda permitir que usuarios con altos privilegios como los colaboradores realicen ataques de cross site scripting."
2024-09-12 08:03:16 +00:00
}
] ,
2024-09-12 20:03:17 +00:00
"metrics" : {
"cvssMetricV31" : [
2024-09-26 22:03:17 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.8 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 1.7 ,
"impactScore" : 2.7
} ,
2024-09-12 20:03:17 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.8 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 1.7 ,
"impactScore" : 2.7
}
]
} ,
2024-09-26 22:03:17 +00:00
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cminds:cm_popup:*:*:*:*:*:wordpress:*:*" ,
"versionEndExcluding" : "1.7.3" ,
"matchCriteriaId" : "9B299B9D-600E-4CD5-AFD4-E6112481D24A"
}
]
}
]
}
] ,
2024-09-12 08:03:16 +00:00
"references" : [
{
"url" : "https://wpscan.com/vulnerability/3ee3023a-541c-40e6-8d62-24b4b110633c/" ,
2024-09-26 22:03:17 +00:00
"source" : "contact@wpscan.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-09-12 08:03:16 +00:00
}
]
}