First published: Mon Nov 29 2021(Updated: )
The Asgaros Forums WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the name parameter found in the ~/admin/tables/admin-structure-table.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.13. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Asgaros Forum | <1.15.14 |
Update to version 1.15.14 or newer.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Asgaros Forums WordPress plugin vulnerability is CVE-2021-42365.
The severity level of CVE-2021-42365 is medium, with a severity value of 4.8.
The affected software for CVE-2021-42365 is the Asgaros Forums WordPress plugin up to version 1.15.14.
The vulnerability occurs due to insufficient escaping via the name parameter found in the ~/admin/tables/admin-structure-table.php file of the Asgaros Forums WordPress plugin.
Attackers with administrative user access can exploit this vulnerability by injecting arbitrary web scripts.