The WP ULike plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_ulike' shortcode in all versions up to, and including, 4.6.9 due to insufficient input sanitization and output escaping on the user supplied 'wrapper_class' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Configurations
History
05 Mar 2025, 15:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-79 | |
First Time |
Wpulike
Wpulike wp Ulike |
|
References | () https://plugins.trac.wordpress.org/browser/wp-ulike/tags/4.6.9/includes/functions/templates.php#L70 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3052611/wp-ulike/trunk/includes/classes/class-wp-ulike-cta-template.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/4deb1527-0637-44f2-b336-d0cf2a48fa52?source=cve - Third Party Advisory |
21 Nov 2024, 08:50
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://plugins.trac.wordpress.org/browser/wp-ulike/tags/4.6.9/includes/functions/templates.php#L70 - | |
References | () https://plugins.trac.wordpress.org/changeset/3052611/wp-ulike/trunk/includes/classes/class-wp-ulike-cta-template.php - | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/4deb1527-0637-44f2-b336-d0cf2a48fa52?source=cve - |
02 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-02 17:15
Updated : 2025-03-05 15:11
NVD link : CVE-2024-1572
Mitre link : CVE-2024-1572
CVE.ORG link : CVE-2024-1572
JSON object : View
Products Affected
wpulike
- wp_ulike
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')