Description
The Simple Behance Portfolio WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the `dark` parameter in the ~/titan-framework/iframe-font-preview.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.2.
No analysis available yet.
Remediation
Vendor Solution
Uninstall the plugin
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21299 | The Simple Behance Portfolio WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the `dark` parameter in the ~/titan-framework/iframe-font-preview.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.2. |
References
History
Mon, 05 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Simple Behance Portfolio <= 0.2 Reflected Cross-Site Scripting | Simple Behance Portfolio <= 0.2 Reflected Cross-Site Scripting |
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-05-05T18:47:39.313Z
Reserved: 2021-06-10T00:00:00.000Z
Link: CVE-2021-34649
Updated: 2024-08-04T00:19:47.751Z
Status : Modified
Published: 2021-08-16T19:15:14.627
Modified: 2024-11-21T06:10:53.493
Link: CVE-2021-34649
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD