CVE-2024-2293Cross-site Scripting in Site Reviews

Severity
6.4MEDIUMNVD
EPSS
0.3%
top 47.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 13
Latest updateApr 13

Description

The Site Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the user display name in all versions up to, and including, 6.11.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:NExploitability: 3.1 | Impact: 2.7

Affected Packages1 packages

CVEListV5geminilabs/site_reviews6.11.4

🔴Vulnerability Details

3
VulDB
Site Reviews Plugin up to 6.11.4 on WordPress Display Name cross site scripting2026-04-13
GHSA
GHSA-362r-2q86-m3fq: The Site Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the user display name in all versions up to, and including, 62024-03-13
CVEList
Site Reviews <= 6.11.4 - Authenticated(Subscriber+) Stored Cross-Site Scripting via display name2024-03-13

📋Vendor Advisories

1
Red Hat
kernel: bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()2024-04-03
CVE-2024-2293 — Cross-site Scripting in Site Reviews | cvebase