VYPR
High severity7.1NVD Advisory· Published Oct 6, 2024· Updated Apr 23, 2026

CVE-2024-47322

CVE-2024-47322

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ex-Themes WP Timeline – Vertical and Horizontal timeline plugin wp-timelines allows Reflected XSS.This issue affects WP Timeline – Vertical and Horizontal timeline plugin: from n/a through <= 3.6.7.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS vulnerability in WP Timeline plugin versions ≤3.6.7 allows attackers to inject malicious scripts via crafted links, requiring user interaction.

Vulnerability

Overview

The WP Timeline – Vertical and Horizontal timeline plugin for WordPress suffers from a Reflected Cross-Site Scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation [1]. This flaw affects all versions up to and including 3.6.7, allowing an attacker to inject arbitrary HTML and JavaScript into the response page.

Exploitation

Details

Exploitation requires a privileged user (e.g., an administrator) to perform an action such as clicking a malicious link, visiting a crafted page, or submitting a form [1]. The attacker does not need authentication but must trick a logged-in user into interacting with the crafted request. This makes the vulnerability moderately dangerous and suitable for mass-exploit campaigns targeting thousands of websites regardless of size or popularity [1].

Impact

Successful exploitation enables the attacker to execute malicious scripts in the victim's browser, leading to actions such as redirecting visitors to malicious sites, displaying advertisements, or injecting other HTML payloads [1]. This can compromise the integrity of the affected WordPress site and potentially lead to further attacks.

Mitigation

The vulnerability is patched in version 3.6.8 of the plugin [1]. Users are strongly advised to update immediately. If updating is not possible, applying a mitigation rule from Patchstack can block attacks until the update is applied [1]. Given the active threat landscape, prompt action is recommended.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.