The Nextend Social Login and Register plugin for WordPress is vulnerable to a self-based Reflected Cross-Site Scripting via the ‘error_description’ parameter in all versions up to, and including, 3.1.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers, with access to a subscriber-level account, to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: This vulnerability can be successfully exploited on a vulnerable WordPress instance against an OAuth pre-authenticated higher-level user (e.g., administrator) by leveraging a cross-site request forgery in conjunction with a certain social engineering technique to achieve a critical impact scenario (cross-site scripting to administrator-level account creation). However, successful exploitation requires "Debug mode" to be enabled in the plugin's "Global Settings".
Metrics
Affected Vendors & Products
References
History
Thu, 16 Jan 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nextendweb
Nextendweb nextend Social Login |
|
Weaknesses | CWE-79 | |
CPEs | cpe:2.3:a:nextendweb:nextend_social_login:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Nextendweb
Nextendweb nextend Social Login |

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T18:48:22.025Z
Reserved: 2024-02-22T18:32:03.150Z
Link: CVE-2024-1775

Updated: 2024-08-01T18:48:22.025Z

Status : Analyzed
Published: 2024-03-02T08:15:06.257
Modified: 2025-01-16T18:39:46.423
Link: CVE-2024-1775

No data.