Search for vulnerabilities
Vulnerability ID | VCID-5ajy-ezh3-vkct |
Aliases |
CVE-2024-6307
|
Summary | WordPress Core is vulnerable to Stored Cross-Site Scripting via the HTML API in various versions prior to 6.5.5 due to insufficient input sanitization and output escaping on URLs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 4.5 |
Risk | 2.2 |
Affected and Fixed Packages | Package Details |
Reference id | Reference type | URL |
---|---|---|
https://api.first.org/data/v1/epss?cve=CVE-2024-6307 | ||
1074486 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074486 | |
58472 | https://core.trac.wordpress.org/changeset/58472 | |
58473 | https://core.trac.wordpress.org/changeset/58473 | |
bc0d36f8-6569-49a1-b722-5cf57c4bb32a?source=cve | https://www.wordfence.com/threat-intel/vulnerabilities/id/bc0d36f8-6569-49a1-b722-5cf57c4bb32a?source=cve | |
CVE-2024-6307 | https://nvd.nist.gov/vuln/detail/CVE-2024-6307 | |
wordpress-6-5-5 | https://wordpress.org/news/2024/06/wordpress-6-5-5/ |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.69703 |
EPSS Score | 0.00643 |
Published At | July 30, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-31T09:05:51.807858+00:00 | Vulnrichment | Import | https://github.com/cisagov/vulnrichment/blob/develop/2024/6xxx/CVE-2024-6307.json | 37.0.0 |