The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 11 Apr 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Iptanus
Iptanus wordpress File Upload |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Iptanus
Iptanus wordpress File Upload |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-06T14:52:56.919Z
Reserved: 2024-07-10T12:38:13.665Z
Link: CVE-2024-6651
Updated: 2024-08-06T14:52:45.977Z
Status : Analyzed
Published: 2024-08-06T06:15:35.973
Modified: 2025-04-11T15:13:49.117
Link: CVE-2024-6651
No data.
OpenCVE Enrichment
No data.
Weaknesses