- Description
- The Front End Users WordPress plugin through 3.2.32 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
- Source
- contact@wpscan.com
- NVD status
- Analyzed
- Products
- front_end_users
CVSS 3.1
- Type
- Secondary
- Base score
- 7.1
- Impact score
- 3.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
- Severity
- HIGH
- nvd@nist.gov
- CWE-79
- Hype score
- Not currently trending
🚨 CVE-2024-13569 - high 🚨 WordPress Front End Users - Reflected XSS > WordPress Front End Users plugin <= 3.2.32 contains a reflected cross-site scripting ... 👾 https://t.co/1o55tOvJ3g @pdnuclei #NucleiTemplates #cve
@pdnuclei_bot
12 Feb 2026
105 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-13569 The Front End Users WordPress plugin through 3.2.32 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site … https://t.co/ioNeGYidMD
@CVEnew
22 Apr 2025
362 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:etoilewebdesign:front_end_users:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "A6EED9AF-1E4E-411A-8ACF-E8370C5DC9E8",
"versionEndIncluding": "3.2.32",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]