
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-11190 affects the jwp-a11y WordPress plugin through version 4.1.7. The vulnerability was discovered by Taufique Noorani and publicly disclosed on November 12, 2024. This security issue exists in the plugin's settings functionality, specifically impacting WordPress installations including multisite setups (WPScan).
The vulnerability stems from improper sanitization and escaping of certain plugin settings in the jwp-a11y WordPress plugin. This security flaw persists even when the unfiltered_html capability is disallowed, which is particularly concerning in multisite WordPress installations. The vulnerability has been assigned a CVSS score of 3.5 (low severity) (WPScan).
When exploited, this vulnerability allows high-privilege users such as administrators to perform Stored Cross-Site Scripting attacks. The stored XSS payload can be executed when users visit specific pages within the a11y center, potentially leading to cookie theft or other client-side attacks (WPScan).
Currently, there is no known fix available for this vulnerability in the jwp-a11y WordPress plugin (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."