The WP ULike WordPress plugin before 4.7.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
History

Tue, 10 Jun 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Technowich
Technowich wp Ulike
Weaknesses CWE-79
CPEs cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:*
Vendors & Products Technowich
Technowich wp Ulike

Tue, 20 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 May 2025 20:15:00 +0000

Type Values Removed Values Added
Description The WP ULike WordPress plugin before 4.7.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Title WP ULike < 4.7.6 - Admin+ Stored XSS
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2025-05-15T20:06:56.733Z

Updated: 2025-05-20T19:30:22.660Z

Reserved: 2024-12-18T20:12:49.454Z

Link: CVE-2024-12770

cve-icon Vulnrichment

Updated: 2025-05-19T20:32:21.457Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-15T20:15:37.293

Modified: 2025-06-10T12:55:45.537

Link: CVE-2024-12770

cve-icon Redhat

No data.