Back to VulnFeed / CVE-2024-13362
root@hackertop:~/vulnfeed/CVE-2024-13362#
CVE-2024-13362 MEDIUM RCE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

Pay for Post with WooCommerce Plugin on WordPress Parameter url cross site scripting

Pay for Post with WooCommerce Plugin 20d ago Impact pending confirmation
LIFECYCLE
5.1 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in Pay for Post with WooCommerce Plugin on WordPress (E-Commerce Management Software) (the affected version is unknown) and classified as problematic. Affected by this issue is an unknown code of the component Parameter Handler. Upgrading eliminates this vulnerability.
Root Cause Analysis
The manipulation of the argument url with an unknown input leads to a unknown weakness. Using CWE to declare the problem leads to CWE-79. The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Impact: Impacted is integrity.

Countermeasure: Upgrading eliminates this vulnerability.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2024-13362 · CVSS 5.1 · Active Threat