CVE-2024-7822

The Quick Code WordPress plugin through 1.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:gwycon:quick_code:*:*:*:*:*:wordpress:*:*

History

27 Sep 2024, 18:06

Type Values Removed Values Added
CPE cpe:2.3:a:gwycon:quick_code:*:*:*:*:*:wordpress:*:*
First Time Gwycon quick Code
Gwycon
References () https://wpscan.com/vulnerability/3a5bdd7e-7dd5-4749-9fad-ff4d7df20273/ - () https://wpscan.com/vulnerability/3a5bdd7e-7dd5-4749-9fad-ff4d7df20273/ - Exploit, Third Party Advisory

12 Sep 2024, 14:35

Type Values Removed Values Added
CWE CWE-79
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1

12 Sep 2024, 12:35

Type Values Removed Values Added
Summary
  • (es) El complemento Quick Code de WordPress hasta la versión 1.0 no tiene verificación CSRF en algunos lugares y le falta desinfección y escape, lo que podría permitir a los atacantes hacer que el administrador que haya iniciado sesión agregue payloads XSS almacenado a través de un ataque CSRF.

12 Sep 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-12 06:15

Updated : 2024-09-27 18:06


NVD link : CVE-2024-7822

Mitre link : CVE-2024-7822

CVE.ORG link : CVE-2024-7822


JSON object : View

Products Affected

gwycon

  • quick_code
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')