Vulnerability Details CVE-2024-6667
The KBucket: Your Curated Content in WordPress plugin before 4.1.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against admin.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 12.0%
CVSS Severity
CVSS v3 Score 6.1
Products affected by CVE-2024-6667
-
cpe:2.3:a:optimalaccess:kbucket:2.10.0.1
-
cpe:2.3:a:optimalaccess:kbucket:2.11.7
-
cpe:2.3:a:optimalaccess:kbucket:2.11.9
-
cpe:2.3:a:optimalaccess:kbucket:2.12.1
-
cpe:2.3:a:optimalaccess:kbucket:2.12.2
-
cpe:2.3:a:optimalaccess:kbucket:2.13.11
-
cpe:2.3:a:optimalaccess:kbucket:2.13.18
-
cpe:2.3:a:optimalaccess:kbucket:2.13.9
-
cpe:2.3:a:optimalaccess:kbucket:2.14.3
-
cpe:2.3:a:optimalaccess:kbucket:2.14.5
-
cpe:2.3:a:optimalaccess:kbucket:2.3.1
-
cpe:2.3:a:optimalaccess:kbucket:2.3.11
-
cpe:2.3:a:optimalaccess:kbucket:2.3.13
-
cpe:2.3:a:optimalaccess:kbucket:2.3.16
-
cpe:2.3:a:optimalaccess:kbucket:2.3.19
-
cpe:2.3:a:optimalaccess:kbucket:2.3.20
-
cpe:2.3:a:optimalaccess:kbucket:2.3.21
-
cpe:2.3:a:optimalaccess:kbucket:2.3.23
-
cpe:2.3:a:optimalaccess:kbucket:2.3.24
-
cpe:2.3:a:optimalaccess:kbucket:2.3.8
-
cpe:2.3:a:optimalaccess:kbucket:2.3.9
-
cpe:2.3:a:optimalaccess:kbucket:2.4.7
-
cpe:2.3:a:optimalaccess:kbucket:2.4.8
-
cpe:2.3:a:optimalaccess:kbucket:2.6.1
-
cpe:2.3:a:optimalaccess:kbucket:2.6.16
-
cpe:2.3:a:optimalaccess:kbucket:2.6.22
-
cpe:2.3:a:optimalaccess:kbucket:2.6.3
-
cpe:2.3:a:optimalaccess:kbucket:2.6.6
-
cpe:2.3:a:optimalaccess:kbucket:2.6.7
-
cpe:2.3:a:optimalaccess:kbucket:2.7
-
cpe:2.3:a:optimalaccess:kbucket:2.7.4
-
cpe:2.3:a:optimalaccess:kbucket:2.7.6
-
cpe:2.3:a:optimalaccess:kbucket:2.7.7
-
cpe:2.3:a:optimalaccess:kbucket:2.8.0
-
cpe:2.3:a:optimalaccess:kbucket:2.9.0
-
cpe:2.3:a:optimalaccess:kbucket:3.1.3
-
cpe:2.3:a:optimalaccess:kbucket:3.1.6
-
cpe:2.3:a:optimalaccess:kbucket:3.1.9
-
cpe:2.3:a:optimalaccess:kbucket:4.1.1