The Custom Field Suite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the the 'cfs[post_content]' parameter versions up to, and including, 2.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Configurations
Configuration 1 (hide)
|
History
05 Feb 2025, 14:59
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:custom_field_suite_project:custom_field_suite:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-79 | |
First Time |
Custom Field Suite Project custom Field Suite
Custom Field Suite Project |
|
References | () https://plugins.trac.wordpress.org/browser/custom-field-suite/trunk/includes/api.php#L282 - Product | |
References | () https://plugins.trac.wordpress.org/browser/custom-field-suite/trunk/includes/form.php#L69 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/56d8af3b-6c00-49ed-872a-64f7bebb470b?source=cve - Third Party Advisory |
21 Nov 2024, 09:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/custom-field-suite/trunk/includes/api.php#L282 - | |
References | () https://plugins.trac.wordpress.org/browser/custom-field-suite/trunk/includes/form.php#L69 - | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/56d8af3b-6c00-49ed-872a-64f7bebb470b?source=cve - |
13 Jun 2024, 18:36
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
12 Jun 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-12 05:15
Updated : 2025-02-05 14:59
NVD link : CVE-2024-3559
Mitre link : CVE-2024-3559
CVE.ORG link : CVE-2024-3559
JSON object : View
Products Affected
custom_field_suite_project
- custom_field_suite
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')