CVE-2024-5647
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
03/07/2025
Last modified:
03/07/2025
Description
Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled Magnific Popups library (version 1.1.0) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability was fixed in the upstream library (Magnific Popups version 1.2.0) by disabling the loading of HTML within certain fields by default.
Impact
Base Score 3.x
6.40
Severity 3.x
MEDIUM
References to Advisories, Solutions, and Tools
- https://github.com/dimsemenov/Magnific-Popup/releases/tag/1.2.0
- https://plugins.trac.wordpress.org/browser/bold-page-builder/trunk/content_elements_misc/js/jquery.magnific-popup.js
- https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/trunk/assets/front-end/js/lib-view/magnific-popup/jquery.magnific-popup.js
- https://plugins.trac.wordpress.org/browser/robo-gallery/trunk/js/robo_gallery.js#L56
- https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/trunk/vendor/magnific-popup/magnific-popup.js
- https://plugins.trac.wordpress.org/changeset/3153700/essential-addons-for-elementor-lite
- https://plugins.trac.wordpress.org/changeset/3153781/bold-page-builder
- https://plugins.trac.wordpress.org/changeset/3154460/happy-elementor-addons
- https://plugins.trac.wordpress.org/changeset/3166204/carousel-slider
- https://plugins.trac.wordpress.org/changeset/3184626/addons-for-divi
- https://plugins.trac.wordpress.org/changeset/3201991/robo-gallery
- https://themes.trac.wordpress.org/changeset/244604/oceanwp
- https://www.elegantthemes.com/api/changelog/divi-builder.txt
- https://www.elegantthemes.com/api/changelog/divi.txt
- https://www.elegantthemes.com/api/changelog/extra.txt
- https://www.wordfence.com/threat-intel/vulnerabilities/id/dae80fc2-3076-4a32-876d-5df1c62de9bd?source=cve