๐Ÿ” CVE Alert

CVE-2024-35773

HIGH 7.1

WordPress Comment Reply Email plugin <= 1.3 - CSRF to Stored XSS vulnerability

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
0th

Cross-Site Request Forgery (CSRF) vulnerability in WPJohnny, zerOneIT Comment Reply Email allows Cross-Site Scripting (XSS).This issue affects Comment Reply Email: from n/a through 1.3.

CWE CWE-352
Vendor wpjohnny, zeroneit
Product comment reply email
Published Jul 12, 2024
Last Updated Apr 28, 2026
Stay Ahead of the Next One

Get instant alerts for wpjohnny, zeroneit comment reply email

Be the first to know when new high vulnerabilities affecting wpjohnny, zeroneit comment reply email are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

WPJohnny, zerOneIT / Comment Reply Email
n/a โ‰ค 1.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
patchstack.com: https://patchstack.com/database/vulnerability/comment-reply-email/wordpress-comment-reply-email-plugin-1-3-csrf-to-stored-xss-vulnerability?_s_id=cve

Credits

Masamichi Aoki (Patchstack Alliance)