The Enhanced Text Widget WordPress plugin before 1.6.6 does not validate and escape some of its Widget options before outputting them back in attributes, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
History

Thu, 20 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Themecheck
Themecheck enhanced Text Widget
CPEs cpe:2.3:a:themecheck:enhanced_text_widget:*:*:*:*:*:wordpress:*:*
Vendors & Products Themecheck
Themecheck enhanced Text Widget
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2024-03-11T17:56:05.059Z

Updated: 2025-03-20T18:48:42.335Z

Reserved: 2024-01-15T10:56:42.798Z

Link: CVE-2024-0559

cve-icon Vulnrichment

Updated: 2024-08-01T18:11:35.226Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2024-03-11T18:15:17.743

Modified: 2025-03-20T19:15:20.330

Link: CVE-2024-0559

cve-icon Redhat

No data.