प्लेटफ़ॉर्म
wordpress
घटक
noo-organici-library
में ठीक किया गया
2.1.3
CVE-2026-24975 describes a Reflected Cross-Site Scripting (XSS) vulnerability discovered in the NooTheme Organici Library. This flaw allows attackers to inject malicious scripts into web pages viewed by other users, potentially leading to data theft or session hijacking. The vulnerability impacts versions 0.0.0 through 2.1.2 of the Organici Library and has been resolved in version 2.1.3.
An attacker could exploit this Reflected XSS vulnerability by crafting a malicious URL containing JavaScript code. When a user clicks on this URL, the injected script executes within their browser context, allowing the attacker to steal cookies, redirect the user to a phishing site, or deface the website. The impact is particularly severe if the website handles sensitive user data, as an attacker could potentially gain access to credentials or other confidential information. The blast radius extends to any user visiting a page containing the vulnerable Organici Library component, making it a widespread concern for WordPress sites utilizing this plugin.
CVE-2026-24975 was publicly disclosed on 2026-03-25. No public proof-of-concept (PoC) code has been released at the time of writing, but the ease of exploitation for Reflected XSS vulnerabilities suggests a moderate probability of exploitation. Monitor security advisories and threat intelligence feeds for any signs of active exploitation campaigns targeting this vulnerability. Refer to the NVD entry for further details.
WordPress websites utilizing the NooTheme Organici Library are at risk. Specifically, sites with user-facing input fields that are not properly sanitized are particularly vulnerable. Shared hosting environments where plugin updates are managed centrally may also be at increased risk if updates are not applied promptly.
• wordpress / composer / npm:
grep -r 'noo-organici-library' plugins/
wp plugin list | grep organici• generic web:
curl -I 'https://example.com/?param=<script>alert(1)</script>' | grep Content-Security-Policydisclosure
एक्सप्लॉइट स्थिति
EPSS
0.04% (11% शतमक)
CISA SSVC
CVSS वेक्टर
The primary mitigation for CVE-2026-24975 is to immediately upgrade the NooTheme Organici Library to version 2.1.3 or later. If upgrading is not immediately feasible, consider implementing input validation and output encoding on user-supplied data to prevent the injection of malicious scripts. Web Application Firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Regularly scan your WordPress site for vulnerable plugins using security scanning tools.
Update to version 2.1.3, or a newer patched version
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
CVE-2026-24975 is a Reflected XSS vulnerability affecting the NooTheme Organici Library, allowing attackers to inject malicious scripts via crafted URLs.
You are affected if your WordPress site uses NooTheme Organici Library versions 0.0.0 through 2.1.2. Check your plugin versions and update immediately.
Upgrade the NooTheme Organici Library to version 2.1.3 or later. Implement input validation and output encoding as a temporary workaround.
While no active exploitation has been confirmed, the ease of exploitation suggests a potential risk. Monitor security advisories for updates.
Refer to the NooTheme website and WordPress plugin repository for the latest advisory and update information.
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।