CVE-2024-9267

CVSS 3.1 Score 6.1 of 10 (medium)

Details

Published Oct 1, 2024
CWE ID 79

Summary

CVE-2024-9267 identifies a vulnerability in the Easy WordPress Subscribe – Optin Hound plugin for WordPress, affecting all versions up to and including 1.4.3, which is susceptible to Reflected Cross-Site Scripting due to improper URL escaping with the add_query_arg function. This flaw allows unauthenticated attackers to inject malicious web scripts into pages, potentially compromising user interactions if they are tricked into clicking on a crafted link. Remediation involves updating the plugin to a version that addresses this security issue. The vulnerability has a medium severity rating with an exploitability score of 2.8 and requires user interaction for exploitation. Organizations using this plugin risk low confidentiality and integrity impacts but should take preventive measures to mitigate potential attacks.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-9267 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions