The JavaScript Logic WordPress plugin through 0.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
History

Tue, 27 May 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Justintadlock
Justintadlock javascript-logic
Weaknesses CWE-352
CPEs cpe:2.3:a:justintadlock:javascript-logic:0.1:*:*:*:*:wordpress:*:*
Vendors & Products Justintadlock
Justintadlock javascript-logic

Tue, 20 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 May 2025 20:15:00 +0000

Type Values Removed Values Added
Description The JavaScript Logic WordPress plugin through 0.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
Title JavaScript Logic <= 0.1 - CSRF to Stored XSS
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2025-05-15T20:07:13.574Z

Updated: 2025-05-20T19:20:15.080Z

Reserved: 2024-08-22T12:53:20.533Z

Link: CVE-2024-8090

cve-icon Vulnrichment

Updated: 2025-05-19T20:24:51.226Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-15T20:15:57.760

Modified: 2025-05-27T19:59:31.890

Link: CVE-2024-8090

cve-icon Redhat

No data.