vulnerability

WordPress Plugin: paritypress: CVE-2024-6661: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Severity
5
CVSS
(AV:N/AC:L/Au:M/C:P/I:P/A:N)
Published
Jul 26, 2024
Added
May 15, 2025
Modified
May 15, 2025

Description

The ParityPress – Parity Pricing with Discount Rules plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'Discount Text' in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Solution

paritypress-plugin-cve-2024-6661
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.