CVE-2021-24373

The WP Hardening – Fix Your WordPress Security WordPress plugin before 1.2.2 did not sanitise or escape the historyvalue GET parameter before outputting it in a Javascript block, leading to a reflected Cross-Site Scripting issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:getastra:wp_hardening:*:*:*:*:*:wordpress:*:*

History

25 Jun 2021, 13:19

Type Values Removed Values Added
CPE cpe:2.3:a:getastra:wp_hardening:*:*:*:*:*:wordpress:*:*
References (CONFIRM) https://wpscan.com/vulnerability/fcf17278-609f-4f75-8a87-9b4579dee1c8 - (CONFIRM) https://wpscan.com/vulnerability/fcf17278-609f-4f75-8a87-9b4579dee1c8 - Exploit, Third Party Advisory
CWE CWE-79
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 6.1

21 Jun 2021, 20:27

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-21 20:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-24373

Mitre link : CVE-2021-24373

CVE.ORG link : CVE-2021-24373


JSON object : View

Products Affected

getastra

  • wp_hardening
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')