cve-2024-2957
Vulnerability from cvelistv5

**DUPLICATE*** Please use CVE-2024-1983 instead.

Show details on NVD website
{
  "containers": {
    "cna": {
      "providerMetadata": {
        "dateUpdated": "2024-04-24T15:13:32.611Z",
        "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
        "shortName": "Wordfence"
      },
      "rejectedReasons": [
        {
          "lang": "en",
          "value": "**DUPLICATE*** Please use CVE-2024-1983 instead."
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
    "assignerShortName": "Wordfence",
    "cveId": "CVE-2024-2957",
    "datePublished": "2024-04-09T18:59:34.320Z",
    "dateRejected": "2024-04-24T15:13:32.611Z",
    "dateReserved": "2024-03-26T19:12:19.751Z",
    "dateUpdated": "2024-04-24T15:13:32.611Z",
    "state": "REJECTED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.0",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-2957\",\"sourceIdentifier\":\"security@wordfence.com\",\"published\":\"2024-04-09T19:15:38.657\",\"lastModified\":\"2024-04-24T16:15:08.880\",\"vulnStatus\":\"Rejected\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: **DUPLICATE*** Please use CVE-2024-1983 instead.\"}],\"metrics\":{},\"references\":[]}}"
  }
}
Vulnerabilites related to the one you searched
gsd-2024-2957
Vulnerability from gsd

{
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2024-2957"
      ],
      "details": "The Simple Ajax Chat \u2013 Add a Fast, Secure Chat Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the name field in all versions up to, and including, 20240216 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attacker to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
      "id": "GSD-2024-2957",
      "modified": "2024-04-03T05:02:25.660218Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "security@wordfence.com",
        "ID": "CVE-2024-2957",
        "STATE": "REJECT"
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "** REJECT ** **DUPLICATE*** Please use CVE-2024-1983 instead."
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "descriptions": [
          {
            "lang": "en",
            "value": "Rejected reason: **DUPLICATE*** Please use CVE-2024-1983 instead."
          }
        ],
        "id": "CVE-2024-2957",
        "lastModified": "2024-04-24T16:15:08.880",
        "metrics": {},
        "published": "2024-04-09T19:15:38.657",
        "references": [],
        "sourceIdentifier": "security@wordfence.com",
        "vulnStatus": "Rejected"
      }
    }
  }
}
ghsa-629p-r69g-qfrc
Vulnerability from github

The Simple Ajax Chat – Add a Fast, Secure Chat Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the name field in all versions up to, and including, 20240216 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attacker to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Show details on source website
{
  "affected": [],
  "aliases": [
    "CVE-2024-2957"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2024-04-09T19:15:38Z",
    "severity": "HIGH"
  },
  "details": "The Simple Ajax Chat \u2013 Add a Fast, Secure Chat Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the name field in all versions up to, and including, 20240216 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attacker to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
  "id": "GHSA-629p-r69g-qfrc",
  "modified": "2024-04-24T18:30:33Z",
  "published": "2024-04-09T21:32:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2957"
    },
    {
      "type": "WEB",
      "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=3040452%40simple-ajax-chat\u0026new=3040452%40simple-ajax-chat\u0026sfp_email=\u0026sfph_mail="
    },
    {
      "type": "WEB",
      "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f67b5cd8-bae8-48ca-87d5-7445724791f6?source=cve"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
      "type": "CVSS_V3"
    }
  ]
}