The Smart Slider 3 Free and pro WordPress plugins before 3.5.0.9 did not sanitise the Project Name before outputting it back in the page, leading to a Stored Cross-Site Scripting issue. By default, only administrator users could access the affected functionality, limiting the exploitability of the vulnerability. However, some WordPress admins may allow lesser privileged users to access the plugin's functionality, in which case, privilege escalation could be performed.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/7b32a282-e51f-4ee5-b59f-5ba10e62a54d | Exploit Third Party Advisory |
https://smartslider.helpscoutdocs.com/article/1746-changelog | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-06-14 07:15
Updated : 2021-06-22 13:09
NVD link : CVE-2021-24382
Mitre link : CVE-2021-24382
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
nextendweb
- smart_slider