CVE-2024-49593
Advanced Custom Fields <= 6.3.8 & Secure Custom Fields <= 6.3.6.2 - Authenticated (Admin+) Stored Cross-Site Scripting
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Advanced Custom Fields (ACF) before 6.3.9 and Secure Custom Fields before 6.3.6.3 (plugins for WordPress), using the Field Group editor to edit one of the plugin's fields can result in execution of a stored XSS payload. NOTE: if you wish to use the WP Engine alternative update mechanism for the free version of ACF, then you can follow the process shown at the advancedcustomfields.com blog URL within the References section below.
En Advanced Custom Fields (ACF) anterior a la versión 6.3.9 y Secure Custom Fields anterior a la versión 6.3.6.3 (complementos para WordPress), el uso del editor de grupos de campos para editar uno de los campos del complemento puede provocar la ejecución de un payload XSS almacenado. NOTA: si desea utilizar el mecanismo de actualización alternativo de WP Engine para la versión gratuita de ACF, puede seguir el proceso que se muestra en la URL del blog advancedcustomfields.com dentro de la sección Referencias a continuación.
The Advanced Custom Fields & Secure Custom Fields plugins for WordPress are vulnerable to Stored Cross-Site Scripting via ACF field labels in all versions up to, and including, 6.3.8 & 6.3.6.2 respectively due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Please follow the reference listed in this vulnerability record for instructions on how to update to the latest version of ACF that patches this issue and ensures accessibility to updates moving forward. Special note: only the minified files in Secure Custom Fields have been patched meaning the source build files are still vulnerable.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-10-15 CVE Published
- 2024-10-17 CVE Reserved
- 2024-10-17 EPSS Updated
- 2024-11-18 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (4)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Advanced Custom Fields Search vendor "Advanced Custom Fields" | Advanced Custom Fields Search vendor "Advanced Custom Fields" for product "Advanced Custom Fields" | >= 0.0.0.0 <= 6.3.6.2 Search vendor "Advanced Custom Fields" for product "Advanced Custom Fields" and version " >= 0.0.0.0 <= 6.3.6.2" | en |
Affected
|