First published: Fri Jan 31 2025(Updated: )
The Fantastic ElasticSearch WordPress plugin through 4.1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
ElasticSearch WordPress Plugin | <4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13221 has a high severity due to the potential for Reflected Cross-Site Scripting attacks.
To fix CVE-2024-13221, upgrade the Fantastic ElasticSearch WordPress plugin to a version later than 4.1.0.
CVE-2024-13221 affects users of the Fantastic ElasticSearch WordPress plugin version 4.1.0 and earlier.
CVE-2024-13221 is a Reflected Cross-Site Scripting vulnerability.
An attacker could exploit CVE-2024-13221 to execute JavaScript in the context of high privilege users, such as administrators.