A cross-site scripting (XSS) attack can cause arbitrary code (JavaScript) to run in a user's browser and can use an application as the vehicle for the attack. The XSS payload given in the "Duplicate Title" text box executes whenever the user opens the Settings Page of the Post Duplicator Plugin or the application root page after duplicating any of the existing posts.
References
Link | Resource |
---|---|
https://cybersecurityworks.com/zerodays/cve-2021-33852-stored-cross-site-scripting-in-wordpress-post-duplicator-plugin-2-23.html | Exploit Third Party Advisory |
https://cybersecurityworks.com/zerodays/cve-2021-33852-stored-cross-site-scripting-in-wordpress-post-duplicator-plugin-2-23.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://cybersecurityworks.com/zerodays/cve-2021-33852-stored-cross-site-scripting-in-wordpress-post-duplicator-plugin-2-23.html - Exploit, Third Party Advisory |
Information
Published : 2022-03-10 17:42
Updated : 2024-11-21 06:09
NVD link : CVE-2021-33852
Mitre link : CVE-2021-33852
CVE.ORG link : CVE-2021-33852
JSON object : View
Products Affected
metaphorcreations
- post_duplicator
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')