Vulnerability Description
The Passbeemedia Web Push Notification WordPress plugin through 1.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sjehutch | Passbeemedia Web Push Notification | 1.0 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/0e8ce3cf-1598-4c5d-b119-99d5f676e619/ExploitThird Party Advisory
FAQ
What is CVE-2024-13877?
CVE-2024-13877 is a vulnerability with a CVSS score of 7.1 (HIGH). The Passbeemedia Web Push Notification WordPress plugin through 1.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which ...
How severe is CVE-2024-13877?
CVE-2024-13877 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-13877?
Check the references section above for vendor advisories and patch information. Affected products include: Sjehutch Passbeemedia Web Push Notification.