The Modal Portfolio plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.7.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
References
| Link | Resource |
|---|---|
| https://wordpress.org/plugins/modal-portfolio/#developers | Product |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/dc049cab-6793-4656-9b17-8ca64c566c4c?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-02-28 09:15
Updated : 2025-03-06 17:45
NVD link : CVE-2024-13851
Mitre link : CVE-2024-13851
CVE.ORG link : CVE-2024-13851
JSON object : View
Products Affected
internet-formation
- modal_portfolio
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
