
Cloud Vulnerability DB
A community-led vulnerabilities database
The WordPress连接微博 WordPress plugin through version 2.5.6 contains a security vulnerability identified as CVE-2024-12282. The vulnerability was discovered by Bob Matyas and was publicly disclosed on December 4, 2024. This security issue affects the plugin's form handling mechanisms, potentially exposing WordPress installations to cross-site scripting attacks (WPScan).
The vulnerability stems from two primary security issues: the absence of CSRF (Cross-Site Request Forgery) checks in certain areas of the plugin and inadequate sanitization and escaping of user input. These vulnerabilities can be chained together to execute a stored XSS (Cross-Site Scripting) attack through a CSRF vector. The vulnerability has been assigned a CVSS score of 7.1, categorized as high severity, and is classified under CWE-79 (WPScan).
When successfully exploited, this vulnerability allows attackers to execute stored XSS payloads by targeting logged-in administrators through CSRF attacks. This could potentially lead to the compromise of administrative accounts and unauthorized modifications to the WordPress installation (WPScan).
Currently, there is no known fix available for this vulnerability in the WordPress连接微博 plugin. Users are advised to consider removing or disabling the plugin until a security patch is released (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."