CVE-2021-24436
Summary
| CVE | CVE-2021-24436 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-07-19 11:15:00 UTC |
| Updated | 2021-07-28 13:22:00 UTC |
| Description | The W3 Total Cache WordPress plugin before 2.1.4 was vulnerable to a reflected Cross-Site Scripting (XSS) security vulnerability within the "extension" parameter in the Extensions dashboard, which is output in an attribute without being escaped first. This could allow an attacker, who can convince an authenticated admin into clicking a link, to run malicious JavaScript within the user's web browser, which could lead to full site compromise. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Attention Required! | Cloudflare |
CONFIRM |
wpscan.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: renniepak
Legacy QID Mappings
- 154144 WordPress W3 Total Cache Plugin: Reflected Cross-Site Scripting (XSS) Vulnerability (CVE-2021-24436)
- 730858 WordPress Plugin W3 Total Cache Reflected Cross-Site Scripting (XSS) Vulnerability