The W3 Total Cache WordPress plugin before 2.1.5 was affected by a reflected Cross-Site Scripting (XSS) issue within the "extension" parameter in the Extensions dashboard, when the 'Anonymously track usage to improve product quality' setting is enabled, as the parameter is output in a JavaScript context without proper escaping. This could allow an attacker, who can convince an authenticated admin into clicking a link, to run malicious JavaScript within the user's web browser, which could lead to full site compromise.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/3e855e09-056f-45b5-89a9-d644b7d8c9d0 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/3e855e09-056f-45b5-89a9-d644b7d8c9d0 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/3e855e09-056f-45b5-89a9-d644b7d8c9d0 - Exploit, Third Party Advisory |
Information
Published : 2021-07-19 11:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24452
Mitre link : CVE-2021-24452
CVE.ORG link : CVE-2021-24452
JSON object : View
Products Affected
boldgrid
- w3_total_cache
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')