CVE-2024-10896

The Logo Slider WordPress plugin before 4.5.0 does not sanitise and escape some of its Logo and Slider settings, which could allow high privilege users such as Contributor to perform Stored Cross-Site Scripting
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:logichunt:logo_slider:*:*:*:*:*:wordpress:*:*

History

15 May 2025, 17:35

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/1304c2b6-922d-455e-bae8-d6bf855eddd9/ - () https://wpscan.com/vulnerability/1304c2b6-922d-455e-bae8-d6bf855eddd9/ - Exploit, Third Party Advisory
First Time Logichunt logo Slider
Logichunt
CPE cpe:2.3:a:logichunt:logo_slider:*:*:*:*:*:wordpress:*:*

29 Nov 2024, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
Summary
  • (es) El complemento Logo Slider de WordPress anterior a la versión 4.5.0 no desinfecta ni evita algunas de las configuraciones de su logotipo y control deslizante, lo que podría permitir que usuarios con privilegios elevados, como los colaboradores, realicen Cross-Site Scripting almacenado.
CWE CWE-78

28 Nov 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-28 06:15

Updated : 2025-05-15 17:35


NVD link : CVE-2024-10896

Mitre link : CVE-2024-10896

CVE.ORG link : CVE-2024-10896


JSON object : View

Products Affected

logichunt

  • logo_slider
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')