CVE-2024-4439

Scores

EPSS

0.908high90.8%
0%20%40%60%80%100%

Percentile: 90.8%

CVSS

6.1medium3.x
0246810

CVSS Score: 6.1/10

All CVSS Scores

CVSS 3.x
6.1

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Description

WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author’s avatar.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesdebiannvdubuntu

CWEs

CWE-80

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-4439

Source: github-poc

URL: https://github.com/w0r1i0g1ht/CVE-2024-4439

Vulnerable Software (10)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",          "versionEndExcluding": "6.0.8",          "versionStartIncluding...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:johnpbloch:wordpress-core:*:*:*:*:*:php:*:*",          "versionEndExcluding": "6.0.8",          "versionStartI...

Source: anchore_overrides

Type: Configuration

Product: wordpress

Operating System: ubuntu focal 20.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: wordpress

Operating System: ubuntu mantic 23.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: wordpress

Operating System: ubuntu oracular 24.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: wordpress

Operating System: ubuntu plucky 25.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: wordpress

Operating System: ubuntu questing 25.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: wordpress

Operating System: debian

Trait:
{  "fixed": "6.5.2+dfsg1-1"}

Source: debian

Type: Configuration

Product: wordpress

Operating System: debian bullseye 11

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Vendor: *

Product: wordpress

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",      "versionEndIncluding": "6.0.7",      "versionStartIncluding": "6.0",      "vulnerable": true    },...

Source: nvd

End of list