The W3 Total Cache WordPress plugin before 2.1.4 was vulnerable to a reflected Cross-Site Scripting (XSS) security vulnerability within the "extension" parameter in the Extensions dashboard, which is output in an attribute without being escaped first. This could allow an attacker, who can convince an authenticated admin into clicking a link, to run malicious JavaScript within the user's web browser, which could lead to full site compromise.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-11348 The W3 Total Cache WordPress plugin before 2.1.4 was vulnerable to a reflected Cross-Site Scripting (XSS) security vulnerability within the "extension" parameter in the Extensions dashboard, which is output in an attribute without being escaped first. This could allow an attacker, who can convince an authenticated admin into clicking a link, to run malicious JavaScript within the user's web browser, which could lead to full site compromise.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2024-08-03T19:28:24.018Z

Reserved: 2021-01-14T00:00:00

Link: CVE-2021-24436

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-19T11:15:08.403

Modified: 2024-11-21T05:53:04.217

Link: CVE-2021-24436

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.