Vulnerability Description
The jQuery Reply to Comment WordPress plugin through 1.31 does not have any CSRF check when saving its settings, nor sanitise or escape its 'Quote String' and 'Reply String' settings before outputting them in Comments, leading to a Stored Cross-Site Scripting issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jquery-Reply-To-Comment Project | Jquery-Reply-To-Comment | <= 1.31 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/aa23f743-811b-4fd1-81a9-42916342e312ExploitThird Party Advisory
- https://wpscan.com/vulnerability/aa23f743-811b-4fd1-81a9-42916342e312ExploitThird Party Advisory
FAQ
What is CVE-2021-24543?
CVE-2021-24543 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The jQuery Reply to Comment WordPress plugin through 1.31 does not have any CSRF check when saving its settings, nor sanitise or escape its 'Quote String' and 'Reply String' settings before outputting...
How severe is CVE-2021-24543?
CVE-2021-24543 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-24543?
Check the references section above for vendor advisories and patch information. Affected products include: Jquery-Reply-To-Comment Project Jquery-Reply-To-Comment.