{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-2640","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","dateReserved":"2024-03-19T12:41:07.814Z","datePublished":"2024-07-12T06:00:05.185Z","dateUpdated":"2024-08-01T19:18:48.172Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2024-07-12T06:00:05.185Z"},"title":"Watu Quiz < 3.4.1.2 - Author+ Stored XSS","problemTypes":[{"descriptions":[{"description":"CWE-79 Cross-Site Scripting (XSS)","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Watu Quiz","versions":[{"status":"affected","versionType":"semver","version":"0","lessThan":"3.4.1.2"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The Watu Quiz WordPress plugin before 3.4.1.2 does not sanitise and escape some of its settings, which could allow users such as authors (if they've been authorized by admins) to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed."}],"references":[{"url":"https://wpscan.com/vulnerability/d46db635-9d84-4268-a789-406a0db4cccf/","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"Eunho Kim","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"}]}],"affected":[{"vendor":"kibokolabs","product":"watu_quiz","cpes":["cpe:2.3:a:kibokolabs:watu_quiz:-:*:*:*:*:wordpress:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"3.4.1.2","versionType":"semver"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.8,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L","integrityImpact":"LOW","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-07-24T14:18:11.150943Z","id":"CVE-2024-2640","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-24T14:19:44.930Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T19:18:48.172Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/d46db635-9d84-4268-a789-406a0db4cccf/","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]}]}}