The Tracking Code Manager WordPress plugin before 2.4.0 does not sanitise and escape some of its metabox settings when outputing them in the page, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/9eb21250-34bd-4600-a0a5-7c5117f69f04/ | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/9eb21250-34bd-4600-a0a5-7c5117f69f04/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-01-30 06:15
Updated : 2025-05-11 23:38
NVD link : CVE-2024-10309
Mitre link : CVE-2024-10309
CVE.ORG link : CVE-2024-10309
JSON object : View
Products Affected
data443
- tracking_code_manager
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
