Description
The jQuery Tagline Rotator WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/jquery-tagline-rotator.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.1.5.
No analysis available yet.
Remediation
Vendor Solution
Uninstall the plugin
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21313 | The jQuery Tagline Rotator WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/jquery-tagline-rotator.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.1.5. |
References
History
Fri, 23 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-05-23T20:02:35.807Z
Reserved: 2021-06-10T00:00:00.000Z
Link: CVE-2021-34663
Updated: 2024-08-04T00:19:47.819Z
Status : Modified
Published: 2021-08-16T19:15:15.367
Modified: 2024-11-21T06:10:55.200
Link: CVE-2021-34663
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD