CVE-2024-39310
CVSS V2 None
CVSS V3 None
Description
The Basil recipe theme for WordPress is vulnerable to Persistent Cross-Site Scripting (XSS) via the `post_title` parameter in versions up to, and including, 2.0.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses a compromised page. Because the of the default WordPress validation, it is not possible to insert the payload directly but if the Cooked plugin is installed, it is possible to create a recipe post type (cp_recipe) and inject the payload in the title field. Version 2.0.5 contains a patch for the issue.
Overview
- CVE ID
- CVE-2024-39310
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-07-01T21:19:35.867Z
- Last Modified Date
- 2024-07-01T21:19:35.867Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/XjSv/Basil/security/advisories/GHSA-cr7v-8v2h-49vx | x_refsource_CONFIRM |
https://github.com/XjSv/Basil/commit/e2b1dbf1637d1ec2663f9aa1a563b02dc76a8146 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-39310 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39310 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-07-02 13:10:52 | Added to TrackCVE |