CVE-2024-10551

The Sticky Social Icons WordPress plugin through 1.2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:sanil:sticky_social_icons:*:*:*:*:*:wordpress:*:*

History

07 May 2025, 00:01

Type Values Removed Values Added
CPE cpe:2.3:a:sanil:sticky_social_icons:*:*:*:*:*:wordpress:*:*
First Time Sanil
Sanil sticky Social Icons
References () https://wpscan.com/vulnerability/cd1aea4a-e5a6-4f87-805d-459b293bbf28/ - () https://wpscan.com/vulnerability/cd1aea4a-e5a6-4f87-805d-459b293bbf28/ - Exploit, Third Party Advisory

06 Dec 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-06 06:15

Updated : 2025-05-07 00:01


NVD link : CVE-2024-10551

Mitre link : CVE-2024-10551

CVE.ORG link : CVE-2024-10551


JSON object : View

Products Affected

sanil

  • sticky_social_icons
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')