The jQuery Reply to Comment WordPress plugin through 1.31 does not have any CSRF check when saving its settings, nor sanitise or escape its 'Quote String' and 'Reply String' settings before outputting them in Comments, leading to a Stored Cross-Site Scripting issue.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/aa23f743-811b-4fd1-81a9-42916342e312 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/aa23f743-811b-4fd1-81a9-42916342e312 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/aa23f743-811b-4fd1-81a9-42916342e312 - Exploit, Third Party Advisory |
Information
Published : 2021-10-25 14:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24543
Mitre link : CVE-2021-24543
CVE.ORG link : CVE-2021-24543
JSON object : View
Products Affected
jquery-reply-to-comment_project
- jquery-reply-to-comment