CVE-2024-1572

The WP ULike plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_ulike' shortcode in all versions up to, and including, 4.6.9 due to insufficient input sanitization and output escaping on the user supplied 'wrapper_class' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:*

History

05 Mar 2025, 15:11

Type Values Removed Values Added
CPE cpe:2.3:a:wpulike:wp_ulike:*:*:*:*:*:wordpress:*:*
CWE CWE-79
First Time Wpulike
Wpulike wp Ulike
References () https://plugins.trac.wordpress.org/browser/wp-ulike/tags/4.6.9/includes/functions/templates.php#L70 - () https://plugins.trac.wordpress.org/browser/wp-ulike/tags/4.6.9/includes/functions/templates.php#L70 - Product
References () https://plugins.trac.wordpress.org/changeset/3052611/wp-ulike/trunk/includes/classes/class-wp-ulike-cta-template.php - () https://plugins.trac.wordpress.org/changeset/3052611/wp-ulike/trunk/includes/classes/class-wp-ulike-cta-template.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/4deb1527-0637-44f2-b336-d0cf2a48fa52?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/4deb1527-0637-44f2-b336-d0cf2a48fa52?source=cve - Third Party Advisory

21 Nov 2024, 08:50

Type Values Removed Values Added
Summary
  • (es) El complemento WP ULike para WordPress es vulnerable a Cross-Site Scripting Almacenado a través del código corto 'wp_ulike' del complemento en todas las versiones hasta la 4.6.9 incluida debido a una sanitización de entrada insuficiente y a un escape de salida en el atributo 'wrapper_class' proporcionado por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada.
References () https://plugins.trac.wordpress.org/browser/wp-ulike/tags/4.6.9/includes/functions/templates.php#L70 - () https://plugins.trac.wordpress.org/browser/wp-ulike/tags/4.6.9/includes/functions/templates.php#L70 -
References () https://plugins.trac.wordpress.org/changeset/3052611/wp-ulike/trunk/includes/classes/class-wp-ulike-cta-template.php - () https://plugins.trac.wordpress.org/changeset/3052611/wp-ulike/trunk/includes/classes/class-wp-ulike-cta-template.php -
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/4deb1527-0637-44f2-b336-d0cf2a48fa52?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/4deb1527-0637-44f2-b336-d0cf2a48fa52?source=cve -

02 May 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-02 17:15

Updated : 2025-03-05 15:11


NVD link : CVE-2024-1572

Mitre link : CVE-2024-1572

CVE.ORG link : CVE-2024-1572


JSON object : View

Products Affected

wpulike

  • wp_ulike
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')