In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into importing all new settings. These settings could be modified to include malicious JavaScript, therefore allowing an attacker to inject payloads that could aid in further infection of the site.
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5 | Exploit Third Party Advisory | 
| https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/ | Exploit Third Party Advisory | 
| https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5 | Exploit Third Party Advisory | 
| https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/ | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 05:52
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5 - Exploit, Third Party Advisory | |
| References | () https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/ - Exploit, Third Party Advisory | 
Information
                Published : 2021-04-05 19:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24162
Mitre link : CVE-2021-24162
CVE.ORG link : CVE-2021-24162
JSON object : View
Products Affected
                expresstech
- responsive_menu
CWE
                
                    
                        
                        CWE-352
                        
            Cross-Site Request Forgery (CSRF)
