Vulnerability Description
The Starbox WordPress plugin before 3.5.0 does not sanitise and escape some parameters, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Squirrly | Starbox | < 3.5.0 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/9784d7c8-e3aa-42af-ace8-5b2b37ebc9cb/ExploitThird Party Advisory
- https://wpscan.com/vulnerability/9784d7c8-e3aa-42af-ace8-5b2b37ebc9cb/ExploitThird Party Advisory
FAQ
What is CVE-2024-1273?
CVE-2024-1273 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The Starbox WordPress plugin before 3.5.0 does not sanitise and escape some parameters, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks
How severe is CVE-2024-1273?
CVE-2024-1273 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-1273?
Check the references section above for vendor advisories and patch information. Affected products include: Squirrly Starbox.