The mEintopf WordPress plugin through 0.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
History

Wed, 09 Apr 2025 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Tiefpunkt
Tiefpunkt meintopf
Weaknesses CWE-79
CPEs cpe:2.3:a:tiefpunkt:meintopf:*:*:*:*:*:wordpress:*:*
Vendors & Products Tiefpunkt
Tiefpunkt meintopf

Thu, 20 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 19:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Thu, 20 Mar 2025 06:15:00 +0000

Type Values Removed Values Added
Description The mEintopf WordPress plugin through 0.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Title Meintopf <= 0.2.1 - Reflected XSS
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2025-03-20T06:00:05.661Z

Updated: 2025-03-20T19:09:54.407Z

Reserved: 2025-02-14T18:34:49.860Z

Link: CVE-2024-13876

cve-icon Vulnrichment

Updated: 2025-03-20T19:09:42.791Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-20T06:15:21.910

Modified: 2025-04-09T13:39:49.970

Link: CVE-2024-13876

cve-icon Redhat

No data.