First published: Mon Jul 12 2021(Updated: )
The WP Reset – Most Advanced WordPress Reset Tool WordPress plugin before 1.90 did not sanitise or escape its extra_data parameter when creating a snapshot via the admin dashboard, leading to an authenticated Stored Cross-Site Scripting issue
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP Reset | <1.90 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24424 has been classified as a high severity vulnerability due to its potential for authenticated Stored Cross-Site Scripting attacks.
To mitigate CVE-2021-24424, update the WP Reset plugin to version 1.90 or later where the vulnerability has been addressed.
CVE-2021-24424 is categorized as an authenticated Stored Cross-Site Scripting vulnerability affecting the WP Reset plugin.
Users of the WP Reset plugin versions prior to 1.90 who are authenticated administrators may be affected by CVE-2021-24424.
Attackers exploiting CVE-2021-24424 can execute malicious scripts in the context of the user's session, potentially leading to data theft or site compromise.