The Top Comments WordPress plugin through 1.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Metrics
Affected Vendors & Products
References
History
Mon, 09 Jun 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Top Comments Project
Top Comments Project top Comments |
|
Weaknesses | CWE-79 | |
CPEs | cpe:2.3:a:top_comments_project:top_comments:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Top Comments Project
Top Comments Project top Comments |
Tue, 20 May 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 15 May 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Top Comments WordPress plugin through 1.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | |
Title | Top Comments <= 1.0 - Admin+ Stored Cross-Site Scripting | |
References |
|

Status: PUBLISHED
Assigner: WPScan
Published: 2025-05-15T20:06:58.092Z
Updated: 2025-05-20T19:29:37.922Z
Reserved: 2024-12-20T21:01:42.468Z
Link: CVE-2024-12874

Updated: 2025-05-19T20:31:31.494Z

Status : Analyzed
Published: 2025-05-15T20:15:37.927
Modified: 2025-06-09T20:01:29.967
Link: CVE-2024-12874

No data.