The Simple Image Popup Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sips_popup' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00101}

epss

{'score': 0.0019}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00064}

epss

{'score': 0.00101}


Fri, 01 Nov 2024 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:purvabathe:simple_image_popup_shortcode:*:*:*:*:*:*:*:* cpe:2.3:a:purvabathe:simple_image_popup_shortcode:*:*:*:*:*:wordpress:*:*

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T21:11:12.441Z

Reserved: 2024-05-24T19:18:14.893Z

Link: CVE-2024-5342

cve-icon Vulnrichment

Updated: 2024-08-01T21:11:12.441Z

cve-icon NVD

Status : Modified

Published: 2024-06-06T02:15:55.087

Modified: 2024-11-21T09:47:27.517

Link: CVE-2024-5342

cve-icon Redhat

No data.