{"api_version":"1","generated_at":"2026-04-10T20:22:28+00:00","cve":"CVE-2021-25120","urls":{"html":"https://cve.report/CVE-2021-25120","api":"https://cve.report/api/cve/CVE-2021-25120.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-25120","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-25120"},"summary":{"title":"CVE-2021-25120","description":"The Easy Social Feed Free and Pro WordPress plugins before 6.2.7 do not sanitise some of their parameters used via AJAX actions before outputting them back in the response, leading to Reflected Cross-Site Scripting issues","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-04-18 18:15:00","updated_at":"2022-04-25 16:42:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/0ad020b5-0d16-4521-8ea7-39cd206ab9f6","name":"https://wpscan.com/vulnerability/0ad020b5-0d16-4521-8ea7-39cd206ab9f6","refsource":"MISC","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-25120","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25120","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Thura Moe Myint","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"25120","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easysocialfeed","cpe5":"easy_social_feed","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"free","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25120","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easysocialfeed","cpe5":"easy_social_feed","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"pro","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2021-25120","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Easy Social Feed < 6.2.7 - Reflected Cross-Site Scripting"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Easy Social Feed Pro","version":{"version_data":[{"version_affected":"<","version_name":"6.2.7","version_value":"6.2.7"}]}},{"product_name":"Easy Social Feed – Social Photos Gallery – Post Feed – Like Box","version":{"version_data":[{"version_affected":"<","version_name":"6.2.7","version_value":"6.2.7"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Easy Social Feed Free and Pro WordPress plugins before 6.2.7 do not sanitise some of their parameters used via AJAX actions before outputting them back in the response, leading to Reflected Cross-Site Scripting issues"}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/0ad020b5-0d16-4521-8ea7-39cd206ab9f6","name":"https://wpscan.com/vulnerability/0ad020b5-0d16-4521-8ea7-39cd206ab9f6"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-79 Cross-site Scripting (XSS)","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Thura Moe Myint"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-04-18 18:15:00","lastModifiedDate":"2022-04-25 16:42:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:easysocialfeed:easy_social_feed:*:*:*:*:pro:wordpress:*:*","versionEndExcluding":"6.2.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:easysocialfeed:easy_social_feed:*:*:*:*:free:wordpress:*:*","versionEndExcluding":"6.3.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"25120","Ordinal":"199882","Title":"CVE-2021-25120","CVE":"CVE-2021-25120","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"25120","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}