Vulnerability Description
The Logo Manager For Enamad WordPress plugin through 0.7.1 does not sanitise and escape in its widgets settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wp-Master | Logo Manager For Enamad | <= 0.7.1 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/37b5ed06-0633-49e0-b47d-8aa2f4510179/ExploitThird Party Advisory
FAQ
What is CVE-2024-5170?
CVE-2024-5170 is a vulnerability with a CVSS score of 4.8 (MEDIUM). The Logo Manager For Enamad WordPress plugin through 0.7.1 does not sanitise and escape in its widgets settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scrip...
How severe is CVE-2024-5170?
CVE-2024-5170 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-5170?
Check the references section above for vendor advisories and patch information. Affected products include: Wp-Master Logo Manager For Enamad.