First published: Wed Mar 09 2022(Updated: )
A cross-site scripting (XSS) attack can cause arbitrary code (JavaScript) to run in a user's browser and can use an application as the vehicle for the attack. The XSS payload given in the "Duplicate Title" text box executes whenever the user opens the Settings Page of the Post Duplicator Plugin or the application root page after duplicating any of the existing posts.
Credit: disclose@cybersecurityworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Metaphor Creations Post Duplicator | =2.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33852 is classified as a high-severity vulnerability due to its potential for executing arbitrary JavaScript in a user's browser.
To fix CVE-2021-33852, it is recommended to update the Metaphor Creations Post Duplicator plugin to the latest version that addresses this vulnerability.
If you cannot update to a patched version for CVE-2021-33852, consider disabling the Post Duplicator plugin to mitigate the risk of XSS attacks.
CVE-2021-33852 is associated with a cross-site scripting (XSS) attack that allows an attacker to run arbitrary code in a user's browser.
CVE-2021-33852 affects version 2.23 of the Metaphor Creations Post Duplicator plugin used in WordPress.