CVE-2024-13221: Fantastic ElasticSearch Plugin <= 4.1.0 - Cross-Site Scripting
漏洞描述
Fantastic ElasticSearch WordPress plugin <= 4.1.0 contains a reflected cross-site scripting caused by unsanitized parameter output, letting attackers execute malicious scripts in the context of high privilege users, exploit requires victim to visit a malicious link. [已公开] id: CVE-2024-13221 info: name: Fantastic ElasticSearch Plugin <= 4.1.0 - Cross-Site Scripting author: Sourabh-Sahu severity: medium description: | Fantastic ElasticSearch WordPress plugin <= 4.1.0 contains a reflected cross-site scripting caused by unsanitized parameter output, letting attackers execute malicious scripts in the context of high privilege users, exploit requires victim to visit a malicious link. impact: | Attackers can execute malicious scripts in the context of high privilege users, potentially leading to session hijacking or privilege escalation. remediation: | Update to version 4.1.1 or later where input sanitization and escaping are properly implemented. reference: - https://wpscan.com/vulnerability/693f4cc4-a082-46bc-abc9-a08919f70157/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2024-13221 cwe-id: CWE-79 epss-score: 0.00569 epss-percent
影响范围
未知
修复建议
暂无