CVE-2024-8056

The MM-Breaking News WordPress plugin through 0.7.9 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:mm-breaking_news_project:mm-breaking_news:*:*:*:*:*:wordpress:*:*

History

27 Sep 2024, 21:29

Type Values Removed Values Added
CWE CWE-79
References () https://wpscan.com/vulnerability/203b8122-f1e5-4e9e-ba83-f5cd59d8a289/ - () https://wpscan.com/vulnerability/203b8122-f1e5-4e9e-ba83-f5cd59d8a289/ - Exploit, Third Party Advisory
First Time Mm-breaking News Project mm-breaking News
Mm-breaking News Project
CPE cpe:2.3:a:mm-breaking_news_project:mm-breaking_news:*:*:*:*:*:wordpress:*:*

12 Sep 2024, 13:35

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-12 06:15

Updated : 2024-09-27 21:29


NVD link : CVE-2024-8056

Mitre link : CVE-2024-8056

CVE.ORG link : CVE-2024-8056


JSON object : View

Products Affected

mm-breaking_news_project

  • mm-breaking_news
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')