The Smart Slider 3 Free and pro WordPress plugins before 3.5.0.9 did not sanitise the Project Name before outputting it back in the page, leading to a Stored Cross-Site Scripting issue. By default, only administrator users could access the affected functionality, limiting the exploitability of the vulnerability. However, some WordPress admins may allow lesser privileged users to access the plugin's functionality, in which case, privilege escalation could be performed.
References
Link | Resource |
---|---|
https://smartslider.helpscoutdocs.com/article/1746-changelog | Patch Vendor Advisory |
https://wpscan.com/vulnerability/7b32a282-e51f-4ee5-b59f-5ba10e62a54d | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2021-06-14T13:37:14
Updated: 2021-06-14T13:37:14
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24382
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-06-14T14:15:09.117
Modified: 2021-06-22T20:09:47.200
Link: CVE-2021-24382
JSON object: View
Redhat Information
No data.
CWE