CVE-2024-3167

CVSS 3.1 Score 6.4 of 10 (medium)

Details

Published Apr 9, 2024
Updated: Apr 10, 2024

Summary

CVE-2024-3167 is a vulnerability that affects the Ocean Extra plugin for WordPress versions up to and including 2.2.6. The vulnerability is related to Stored Cross-Site Scripting (XSS) and is caused by insufficient input sanitization and output escaping in the 'twitter_username' parameter. Authenticated attackers with contributor-level permissions or higher can exploit this vulnerability to inject arbitrary web scripts, which will execute when a user accesses an injected page. This vulnerability has a risk score of 30 and a base severity rating of MEDIUM. The affected products include various WordPress plugins and their specific versions. To remediate this vulnerability, users should update their Ocean Extra plugin to a version higher than 2.2.6, which includes the necessary fixes to prevent XSS attacks. The potential danger posed by this vulnerability is that it could allow attackers to execute malicious scripts on affected websites, potentially leading to unauthorized access, data theft, or further compromise of the organization's systems.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-3167 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions