Vulnerability Details CVE-2024-5032
The SULly WordPress plugin before 4.3.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 4.6%
CVSS Severity
CVSS v3 Score 4.7
Products affected by CVE-2024-5032
-
cpe:2.3:a:toolstack:sully:0.1
-
cpe:2.3:a:toolstack:sully:0.2
-
cpe:2.3:a:toolstack:sully:0.2.1
-
cpe:2.3:a:toolstack:sully:0.2.2
-
cpe:2.3:a:toolstack:sully:0.3
-
cpe:2.3:a:toolstack:sully:0.3.1
-
cpe:2.3:a:toolstack:sully:0.4
-
cpe:2.3:a:toolstack:sully:0.4.1
-
cpe:2.3:a:toolstack:sully:0.4.2
-
cpe:2.3:a:toolstack:sully:0.5
-
cpe:2.3:a:toolstack:sully:0.5.1
-
cpe:2.3:a:toolstack:sully:0.6
-
cpe:2.3:a:toolstack:sully:0.7
-
cpe:2.3:a:toolstack:sully:1.0
-
cpe:2.3:a:toolstack:sully:1.1
-
cpe:2.3:a:toolstack:sully:1.2
-
cpe:2.3:a:toolstack:sully:1.3
-
cpe:2.3:a:toolstack:sully:1.4
-
cpe:2.3:a:toolstack:sully:1.5
-
cpe:2.3:a:toolstack:sully:2.0
-
cpe:2.3:a:toolstack:sully:2.1
-
cpe:2.3:a:toolstack:sully:3.0
-
cpe:2.3:a:toolstack:sully:4.0
-
cpe:2.3:a:toolstack:sully:4.1
-
cpe:2.3:a:toolstack:sully:4.2
-
cpe:2.3:a:toolstack:sully:4.2.1
-
cpe:2.3:a:toolstack:sully:4.3