First published: Thu Apr 22 2021(Updated: )
The Advanced Custom Fields Pro WordPress plugin before 5.9.1 did not properly escape the generated update URL when outputting it in an attribute, leading to a reflected Cross-Site Scripting issue in the update settings page.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Advanced Custom Fields | <5.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24241 is a vulnerability in the Advanced Custom Fields Pro WordPress plugin before version 5.9.1 that allows a reflected Cross-Site Scripting issue in the update settings page.
The severity of CVE-2021-24241 is medium, with a severity score of 6.1.
CVE-2021-24241 affects the Advanced Custom Fields Pro plugin version up to 5.9.1.
To fix the CVE-2021-24241 vulnerability, upgrade the Advanced Custom Fields Pro plugin to version 5.9.1 or newer.
More information about CVE-2021-24241 can be found at the following references: [Link 1](https://github.com/jdordonezn/Reflected-XSS-in-WordPress-for-ACF-PRO-before-5.9.1-plugin/issues/1), [Link 2](https://wpscan.com/vulnerability/d1e9c995-37bd-4952-b88e-945e02e3c83f), [Link 3](https://www.advancedcustomfields.com/blog/acf-5-9-1-release/).