CVE-2024-11427: Catch Popup <= 1.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting

6.4 CVSS

Description

The Catch Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'catch-popup' shortcode in all versions up to, and including, 1.4.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Classification

CVE ID: CVE-2024-11427

CVSS Base Severity: MEDIUM

CVSS Base Score: 6.4

Affected Products

Vendor: maheshmaharjan

Product: Catch Popup

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 23.99% (scored less or equal to compared to others)

EPSS Date: 2025-02-04 (when was this score calculated)

References

https://www.wordfence.com/threat-intel/vulnerabilities/id/4ac7c825-aa5e-42fb-b1df-8be72945941c?source=cve
https://plugins.trac.wordpress.org/browser/catch-popup/trunk/inc/shortcode.php
https://wordpress.org/plugins/catch-popup/

Timeline