WordPress Core is vulnerable to Stored Cross-Site Scripting via the HTML API in various versions prior to 6.5.5 due to insufficient input sanitization and output escaping on URLs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Project Subscriptions
No data.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4358-1 | wordpress security update |
Debian DSA |
DSA-6075-1 | wordpress security update |
EUVD |
EUVD-2024-47423 | WordPress Core is vulnerable to Stored Cross-Site Scripting via the HTML API in various versions prior to 6.5.5 due to insufficient input sanitization and output escaping on URLs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T21:33:05.534Z
Reserved: 2024-06-25T11:09:22.494Z
Link: CVE-2024-6307
Updated: 2024-08-01T21:33:05.534Z
Status : Deferred
Published: 2024-06-25T11:15:50.820
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-6307
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
Debian DLA
Debian DSA
EUVD