CVE-2024-51889
WordPress vulnerability analysis and mitigation

Overview

A Stored Cross-Site Scripting (XSS) vulnerability has been identified in GeroNikolov's Fancy User List WordPress plugin, affecting versions up to and including 3.1. The vulnerability was discovered by SOPROBRO and was disclosed on November 8, 2024, receiving the identifier CVE-2024-51889 (Patchstack).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (Medium), with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L. This indicates that the vulnerability requires low attack complexity, requires low privileges, and needs user interaction for exploitation. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) (NVD).

Impact

The vulnerability allows attackers to inject malicious scripts into the website, which can then be executed when visitors access the affected pages. These scripts could potentially be used to redirect users, inject unwanted advertisements, or execute other malicious HTML payloads (Patchstack).

Mitigation and workarounds

As of the disclosure date, no official fix has been released for this vulnerability. The security issue has been classified as having a low severity impact and is considered unlikely to be exploited (Patchstack).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-47552CRITICAL9.8
  • dzs-videogallery
NoNoJan 07, 2026
CVE-2025-46494HIGH7.1
  • widgetkit-pro
NoNoJan 07, 2026
CVE-2025-46434MEDIUM6.5
  • theplus_elementor_addon
NoYesJan 07, 2026
CVE-2025-14275MEDIUM6.4
  • jeg-elementor-kit
NoYesJan 08, 2026
CVE-2025-12640MEDIUM4.3
  • folders
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management