CVSS 3.1 Score 7.2 of 10 (high)


Published Mar 29, 2024


CVE-2024-0609 is a vulnerability found in the WP ERP plugin for WordPress, specifically versions up to and including 1.12.9. This vulnerability allows unauthenticated attackers to perform Stored Cross-Site Scripting attacks by injecting arbitrary web scripts through the 'api_key' parameter. The issue arises due to insufficient input sanitization and output escaping. When successfully exploited, these injected scripts can execute whenever a user accesses an affected page. The base severity of this vulnerability is rated as HIGH, with a base score of 7.2 according to the CVSS:3.1 scoring system. It poses a potential danger to organizations as it could lead to unauthorized access, data manipulation, or further compromise of the affected WordPress installations. To remediate this vulnerability, users are advised to update their WP ERP plugin to the latest version available that includes the necessary security patches.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-0609 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options