The Clinked Client Portal plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'clinked-login-button' shortcode in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
Thu, 30 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Jan 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Clinked Client Portal plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'clinked-login-button' shortcode in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | |
| Title | Clinked Client Portal <= 1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-01-30T11:10:18.884Z
Updated: 2025-01-30T14:59:55.421Z
Reserved: 2024-12-11T13:55:57.929Z
Link: CVE-2024-12524
Updated: 2025-01-30T14:59:40.655Z
Status : Received
Published: 2025-01-30T11:15:10.840
Modified: 2025-01-30T11:15:10.840
Link: CVE-2024-12524
No data.