CVE-2021-24162
Published Apr 5, 2021
Last updated 4 years ago
Overview
- Description
- In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into importing all new settings. These settings could be modified to include malicious JavaScript, therefore allowing an attacker to inject payloads that could aid in further infection of the site.
- Source
- contact@wpscan.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:expresstech:responsive_menu:*:*:*:*:free:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "36CF966E-25C0-408C-A993-0FAF0AF9FC31", "versionEndExcluding": "4.0.4" }, { "criteria": "cpe:2.3:a:expresstech:responsive_menu:*:*:*:*:pro:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "B045BC14-6B45-4707-B41C-D1447BBECE04", "versionEndExcluding": "4.0.4" } ], "operator": "OR" } ] } ]