The Simple add pages or posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Feb 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mijnpress
Mijnpress simple Add Pages Or Posts |
|
| CPEs | cpe:2.3:a:mijnpress:simple_add_pages_or_posts:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Mijnpress
Mijnpress simple Add Pages Or Posts |
Wed, 12 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 08 Feb 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Simple add pages or posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | |
| Title | Simple add pages or posts <= 2.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-02-08T12:21:37.492Z
Updated: 2025-02-12T20:51:42.538Z
Reserved: 2025-02-08T00:06:27.045Z
Link: CVE-2024-13850
Updated: 2025-02-12T20:46:36.402Z
Status : Analyzed
Published: 2025-02-08T13:15:06.840
Modified: 2025-02-24T17:36:09.667
Link: CVE-2024-13850
No data.