PT-2025-1638 · WordPress · Cluevo Lms
Dale Mavers
+1
·
Published
2025-01-09
·
Updated
2025-01-09
·
CVE-2024-11328
6.1
Medium
Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions:
CLUEVO LMS, E-Learning Platform plugin for WordPress versions up to, and including, 1.13.2
Description:
The issue is related to Reflected Cross-Site Scripting due to the use of `add query arg` and `remove query arg` without appropriate escaping on the URL. This allows unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Recommendations:
For versions up to, and including, 1.13.2, update to a version higher than 1.13.2 to resolve the issue. As a temporary workaround, consider restricting access to potentially vulnerable pages or links to minimize the risk of exploitation.
Fix
XSS
Weakness Enumeration
Related Identifiers
Affected Products
References · 10
- https://nvd.nist.gov/vuln/detail/CVE-2024-11328 · Security Note
- https://twitter.com/VulmonFeeds/status/1877494739336904951 · Twitter Post
- https://plugins.trac.wordpress.org/browser/cluevo-lms/tags/1.13.2/functions/functions.module-management.inc.php#L1230 · Note
- https://plugins.trac.wordpress.org/browser/cluevo-lms/tags/1.13.2/admin-views/class.module-ratings-page.php#L173 · Note
- https://t.me/cvenotify/106901 · Telegram Post
- https://plugins.trac.wordpress.org/browser/cluevo-lms/tags/1.13.2/functions/functions.module-management.inc.php#L1242 · Note
- https://plugins.trac.wordpress.org/browser/cluevo-lms/tags/1.13.2/functions/functions.module-management.inc.php#L788 · Note
- https://plugins.trac.wordpress.org/browser/cluevo-lms/tags/1.13.2/functions/functions.module-management.inc.php#L1228 · Note
- https://wordfence.com/threat-intel/vulnerabilities/id/5bcfe315-2db1-4f6c-9635-a7fdf5404adf?source=cve · Note
- https://twitter.com/CVEnew/status/1877315761103884764 · Twitter Post