CVSS 3.1 Score 6.4 of 10 (medium)


Published Apr 9, 2024
Updated: Apr 10, 2024


CVE-2024-3167 is a vulnerability that affects the Ocean Extra plugin for WordPress versions up to and including 2.2.6. The vulnerability is related to Stored Cross-Site Scripting (XSS) and is caused by insufficient input sanitization and output escaping in the 'twitter_username' parameter. Authenticated attackers with contributor-level permissions or higher can exploit this vulnerability to inject arbitrary web scripts, which will execute when a user accesses an injected page. This vulnerability has a risk score of 30 and a base severity rating of MEDIUM. The affected products include various WordPress plugins and their specific versions. To remediate this vulnerability, users should update their Ocean Extra plugin to a version higher than 2.2.6, which includes the necessary fixes to prevent XSS attacks. The potential danger posed by this vulnerability is that it could allow attackers to execute malicious scripts on affected websites, potentially leading to unauthorized access, data theft, or further compromise of the organization's systems.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-3167 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options