Home

Description

The Simple File List WordPress plugin before 6.1.13 does not sanitise and escape a generated URL before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against admins.

PUBLISHED Reserved 2024-10-18 | Published 2024-11-14 | Updated 2024-11-14 | Assigner WPScan

Problem types

CWE-79 Cross-Site Scripting (XSS)

Product status

Default status
unaffected

Any version before 6.1.13
affected

Credits

tu3n4nh finder

WPScan coordinator

References

wpscan.com/...rability/9ee74a0f-83ff-4c15-a114-f8f6baab8bf5/ exploit vdb-entry technical-description

cve.org (CVE-2024-10146)

nvd.nist.gov (CVE-2024-10146)

Download JSON