CVE-2024-8713

The Kodex Posts likes plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.5.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pierros:kodex_posts_likes:*:*:*:*:*:wordpress:*:*

History

02 Oct 2024, 16:22

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/kodex-posts-likes/trunk/admin/partials/settings.php#L14 - () https://plugins.trac.wordpress.org/browser/kodex-posts-likes/trunk/admin/partials/settings.php#L14 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/44780988-cadf-4ff2-9ba9-148b7b6650df?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/44780988-cadf-4ff2-9ba9-148b7b6650df?source=cve - Third Party Advisory
First Time Pierros
Pierros kodex Posts Likes
CPE cpe:2.3:a:pierros:kodex_posts_likes:*:*:*:*:*:wordpress:*:*

26 Sep 2024, 13:32

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-25 03:15

Updated : 2024-10-02 16:22


NVD link : CVE-2024-8713

Mitre link : CVE-2024-8713

CVE.ORG link : CVE-2024-8713


JSON object : View

Products Affected

pierros

  • kodex_posts_likes
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')