{"api_version":"1","generated_at":"2026-04-21T15:24:20+00:00","cve":"CVE-2021-24162","urls":{"html":"https://cve.report/CVE-2021-24162","api":"https://cve.report/api/cve/CVE-2021-24162.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-24162","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-24162"},"summary":{"title":"CVE-2021-24162","description":"In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into importing all new settings. These settings could be modified to include malicious JavaScript, therefore allowing an attacker to inject payloads that could aid in further infection of the site.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2021-04-05 19:15:00","updated_at":"2021-04-08 19:10:00"},"problem_types":["CWE-352"],"metrics":[],"references":[{"url":"https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/","name":"https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/","refsource":"MISC","tags":[],"title":"Multiple Vulnerabilities Patched in Responsive Menu Plugin","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5","name":"https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5","refsource":"CONFIRM","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-24162","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24162","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Chloe Chamberland","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"24162","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"expresstech","cpe5":"responsive_menu","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"free","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"24162","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"expresstech","cpe5":"responsive_menu","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"pro","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2021-24162","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Responsive Menu < 4.0.4 - CSRF to Settings Update"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"ExpressTech","product":{"product_data":[{"product_name":"Responsive Menu – Create Mobile-Friendly Menu","version":{"version_data":[{"version_affected":"<","version_name":"4.0.4","version_value":"4.0.4"}]}},{"product_name":"Responsive Menu Pro","version":{"version_data":[{"version_affected":"<","version_name":"4.0.4","version_value":"4.0.4"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into importing all new settings. These settings could be modified to include malicious JavaScript, therefore allowing an attacker to inject payloads that could aid in further infection of the site."}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/","name":"https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/"},{"refsource":"CONFIRM","url":"https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5","name":"https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Chloe Chamberland"}],"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-04-05 19:15:00","lastModifiedDate":"2021-04-08 19:10:00","problem_types":["CWE-352"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:expresstech:responsive_menu:*:*:*:*:free:wordpress:*:*","versionEndExcluding":"4.0.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:expresstech:responsive_menu:*:*:*:*:pro:wordpress:*:*","versionEndExcluding":"4.0.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"24162","Ordinal":"198924","Title":"CVE-2021-24162","CVE":"CVE-2021-24162","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"24162","Ordinal":"1","NoteData":"In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into importing all new settings. These settings could be modified to include malicious JavaScript, therefore allowing an attacker to inject payloads that could aid in further infection of the site.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"24162","Ordinal":"2","NoteData":"2021-04-05","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"24162","Ordinal":"3","NoteData":"2021-04-05","Type":"Other","Title":"Modified"}]}}}