The Top Comments WordPress plugin through 1.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
History

Mon, 09 Jun 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Top Comments Project
Top Comments Project top Comments
Weaknesses CWE-79
CPEs cpe:2.3:a:top_comments_project:top_comments:*:*:*:*:*:wordpress:*:*
Vendors & Products Top Comments Project
Top Comments Project top Comments

Tue, 20 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 May 2025 20:15:00 +0000

Type Values Removed Values Added
Description The Top Comments WordPress plugin through 1.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Title Top Comments <= 1.0 - Admin+ Stored Cross-Site Scripting
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2025-05-15T20:06:58.092Z

Updated: 2025-05-20T19:29:37.922Z

Reserved: 2024-12-20T21:01:42.468Z

Link: CVE-2024-12874

cve-icon Vulnrichment

Updated: 2025-05-19T20:31:31.494Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-15T20:15:37.927

Modified: 2025-06-09T20:01:29.967

Link: CVE-2024-12874

cve-icon Redhat

No data.