In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into importing all new settings. These settings could be modified to include malicious JavaScript, therefore allowing an attacker to inject payloads that could aid in further infection of the site.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5 | Exploit Third Party Advisory |
https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5 | Exploit Third Party Advisory |
https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5 - Exploit, Third Party Advisory | |
References | () https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/ - Exploit, Third Party Advisory |
Information
Published : 2021-04-05 19:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24162
Mitre link : CVE-2021-24162
CVE.ORG link : CVE-2021-24162
JSON object : View
Products Affected
expresstech
- responsive_menu
CWE
CWE-352
Cross-Site Request Forgery (CSRF)