The Smart Slider 3 Free and pro WordPress plugins before 3.5.0.9 did not sanitise the Project Name before outputting it back in the page, leading to a Stored Cross-Site Scripting issue. By default, only administrator users could access the affected functionality, limiting the exploitability of the vulnerability. However, some WordPress admins may allow lesser privileged users to access the plugin's functionality, in which case, privilege escalation could be performed.
References
Link | Resource |
---|---|
https://smartslider.helpscoutdocs.com/article/1746-changelog | Patch Vendor Advisory |
https://wpscan.com/vulnerability/7b32a282-e51f-4ee5-b59f-5ba10e62a54d | Exploit Third Party Advisory |
https://smartslider.helpscoutdocs.com/article/1746-changelog | Patch Vendor Advisory |
https://wpscan.com/vulnerability/7b32a282-e51f-4ee5-b59f-5ba10e62a54d | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://smartslider.helpscoutdocs.com/article/1746-changelog - Patch, Vendor Advisory | |
References | () https://wpscan.com/vulnerability/7b32a282-e51f-4ee5-b59f-5ba10e62a54d - Exploit, Third Party Advisory |
Information
Published : 2021-06-14 14:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24382
Mitre link : CVE-2021-24382
CVE.ORG link : CVE-2021-24382
JSON object : View
Products Affected
nextendweb
- smart_slider
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')