
Cloud Vulnerability DB
A community-led vulnerabilities database
A cross-site scripting (XSS) vulnerability was discovered in WP Admin UI Customize versions prior to 1.5.14. The vulnerability was identified on November 26, 2024, and assigned CVE-2024-53278. This security flaw affects the WordPress plugin WP Admin UI Customize, which is used for customizing WordPress admin interface (JVN Report, NVD).
The vulnerability is classified as a stored cross-site scripting (CWE-79) issue. It received a CVSS v3.0 base score of 4.8 (Medium) with the vector string CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N. The vulnerability requires high privileges and user interaction to be exploited, with the attack vector being network-accessible (JVN Report).
When exploited, the vulnerability allows a malicious admin user to customize the admin screen with malicious content, potentially executing arbitrary scripts in the web browsers of other users accessing the admin screen (JVN Report).
The vulnerability has been patched in version 1.5.14 of the WP Admin UI Customize plugin. Users are strongly recommended to update to this latest version to address the security issue (WordPress Plugin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."