The Lucas String Replace plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.0.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Sep 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lucasstad
Lucasstad lucas String Replace |
|
CPEs | cpe:2.3:a:lucasstad:lucas_string_replace:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Lucasstad
Lucasstad lucas String Replace |
Fri, 13 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 13 Sep 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Lucas String Replace plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.0.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | |
Title | Lucas String Replace <= 2.0.5 - Reflected Cross-Site Scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2024-09-13T15:10:42.409Z
Updated: 2024-09-13T15:32:23.701Z
Reserved: 2024-09-11T20:46:48.136Z
Link: CVE-2024-8734

Updated: 2024-09-13T15:32:16.040Z

Status : Analyzed
Published: 2024-09-13T15:15:18.237
Modified: 2024-09-26T19:30:03.503
Link: CVE-2024-8734

No data.