First published: Tue Jun 01 2021(Updated: )
The Funnel Builder by CartFlows – Create High Converting Sales Funnels For WordPress plugin before 1.6.13 did not sanitise its facebook_pixel_id and google_analytics_id settings, allowing high privilege users to set XSS payload in them, which will either be executed on pages generated by the plugin, or the whole website depending on the settings used.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Krzysztof Kozlowski Konwert | <1.6.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24330 has a critical severity rating due to the potential for cross-site scripting (XSS) attacks.
To mitigate CVE-2021-24330, upgrade the Funnel Builder by CartFlows plugin to version 1.6.13 or later.
CVE-2021-24330 primarily affects high privilege users who can set the facebook_pixel_id and google_analytics_id settings.
An attacker exploiting CVE-2021-24330 can inject malicious scripts that may execute in the context of users visiting affected pages.
Yes, CVE-2021-24330 specifically affects the Funnel Builder by CartFlows WordPress plugin before version 1.6.13.