mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
68 lines
3.2 KiB
JSON
68 lines
3.2 KiB
JSON
{
|
|
"id": "CVE-2024-4034",
|
|
"sourceIdentifier": "security@wordfence.com",
|
|
"published": "2024-05-02T17:15:33.910",
|
|
"lastModified": "2024-11-21T09:42:04.307",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Virtue theme for WordPress is vulnerable to Stored Cross-Site Scripting via a Post Author's name in all versions up to, and including, 3.4.8 due to insufficient input sanitization and output escaping when the latest posts feature is enabled on the homepage. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El tema Virtue para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del nombre del autor de una publicaci\u00f3n en todas las versiones hasta la 3.4.8 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida cuando la funci\u00f3n de publicaciones m\u00e1s recientes est\u00e1 habilitada en la p\u00e1gina de inicio. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security@wordfence.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
|
"baseScore": 6.4,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 3.1,
|
|
"impactScore": 2.7
|
|
}
|
|
]
|
|
},
|
|
"references": [
|
|
{
|
|
"url": "https://themes.trac.wordpress.org/browser/virtue/3.4.8/templates/home/blog-home.php#L87",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=225592%40virtue&new=225592%40virtue&sfp_email=&sfph_mail=#file18",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d8272233-afb3-46f1-ab85-189a3923e29d?source=cve",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://themes.trac.wordpress.org/browser/virtue/3.4.8/templates/home/blog-home.php#L87",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=225592%40virtue&new=225592%40virtue&sfp_email=&sfph_mail=#file18",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d8272233-afb3-46f1-ab85-189a3923e29d?source=cve",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |