VYPR
High severity7.1NVD Advisory· Published Oct 5, 2024· Updated Apr 23, 2026

CVE-2024-47380

CVE-2024-47380

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Lab WP-Lister Lite for eBay wp-lister-for-ebay allows Reflected XSS.This issue affects WP-Lister Lite for eBay: from n/a through <= 3.6.3.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in WP-Lister Lite for eBay plugin (<=3.6.3) allows attackers to inject malicious scripts via improperly neutralized input.

Vulnerability

Overview CVE-2024-47380 is a reflective cross-site scripting (XSS) vulnerability found in the WP-Lister Lite for eBay WordPress plugin, affecting versions from n/a through 3.6.3. The root cause is Improper Neutralization of Input During Web Page Generation, meaning user-supplied data is reflected back to the browser without proper sanitization or encoding [1].

Exploitation

Prerequisites Exploitation requires user interaction: an attacker must trick a privileged user (such as an administrator) into clicking a crafted malicious link, visiting a specially designed page, or submitting a form. The attacker does not require any authentication or special network position, as the attack can be delivered via email, social engineering, or other channels leading to the vulnerable plugin's interface [1].

Impact

If successfully exploited, the attacker can inject arbitrary HTML and JavaScript code into the context of the victim's browser session. This can lead to redirecting users to malicious sites, displaying unwanted advertisements, stealing session cookies, or performing actions on behalf of the victim within the WordPress admin panel. The CVSS v3 score of 7.1 (High) reflects the potential for significant harm, especially given that this type of vulnerability is frequently used in mass-exploit campaigns targeting thousands of websites simultaneously [1].

Mitigation

The vendor has released a patched version 3.6.5 that resolves the vulnerability. Users are strongly advised to update to version 3.6.5 or later immediately. For those unable to update, Patchstack recommends applying a virtual mitigation rule that blocks exploitation attempts until the plugin is updated. As this vulnerability is considered moderately dangerous and expected to be exploited, immediate action is required [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.