The Smash Balloon Social Post Feed WordPress plugin before 4.0.1 did not have any privilege or nonce validation before saving the plugin's setting. As a result, any logged-in user on a vulnerable site could update the settings and store rogue JavaScript on each of its posts and pages.
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/5d252ad7-bf28-44f3-8cd0-c4fe05c48f35 | Third Party Advisory | 
| https://jetpack.com/2021/10/29/security-issues-patched-in-smash-balloon-social-post-feed-plugin/ | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2021-11-29 01:15
Updated : 2021-12-15 05:50
NVD link : CVE-2021-24918
Mitre link : CVE-2021-24918
JSON object : View
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
                smashballoon
- smash_balloon_social_post_feed
 


