The Fathom Analytics WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via the $site_id parameter found in the ~/fathom-analytics.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 3.0.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2641005%40fathom-analytics&new=2641005%40fathom-analytics&sfp_email=&sfph_mail= | Patch Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-41836 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-12-14 16:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-41836
Mitre link : CVE-2021-41836
CVE.ORG link : CVE-2021-41836
JSON object : View
Products Affected
conva
- fathom_analytics
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')