CVE-2024-10551

The Sticky Social Icons WordPress plugin through 1.2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:sanil:sticky_social_icons:*:*:*:*:*:wordpress:*:*

History

07 May 2025, 00:01

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/cd1aea4a-e5a6-4f87-805d-459b293bbf28/ - () https://wpscan.com/vulnerability/cd1aea4a-e5a6-4f87-805d-459b293bbf28/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:sanil:sticky_social_icons:*:*:*:*:*:wordpress:*:*
First Time Sanil
Sanil sticky Social Icons
Summary
  • (es) El complemento Sticky Social Icons de WordPress hasta la versión 1.2.1 no desinfecta ni escapa a algunas de sus configuraciones, lo que podría permitir que usuarios con privilegios elevados como el administrador realicen ataques de sCross-Site Scripting almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo, en una configuración de varios sitios).

06 Dec 2024, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.8
CWE CWE-79

06 Dec 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-06 06:15

Updated : 2025-05-07 00:01


NVD link : CVE-2024-10551

Mitre link : CVE-2024-10551

CVE.ORG link : CVE-2024-10551


JSON object : View

Products Affected

sanil

  • sticky_social_icons
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')