First published: Wed Jun 07 2023(Updated: )
The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with minimal permissions like subscribers, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Webdevocean Wp Quick Frontend Editor | <=5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4378 is a vulnerability in the WP Quick FrontEnd Editor plugin for WordPress that allows authenticated attackers, with minimal permissions, to inject arbitrary scripts.
CVE-2021-4378 affects the WP Quick FrontEnd Editor plugin for WordPress versions up to and including 5.5 due to insufficient input sanitization and output escaping, which allows for stored cross-site scripting.
CVE-2021-4378 has a severity rating of medium with a severity value of 5.4.
Authenticated attackers with minimal permissions, like subscribers, can exploit CVE-2021-4378 by injecting arbitrary scripts into the WP Quick FrontEnd Editor.
Yes, it is recommended to update to a patched version of the WP Quick FrontEnd Editor plugin to fix CVE-2021-4378.