The WordPress Real Media Library WordPress plugin is vulnerable to Stored Cross-Site Scripting via the name parameter in the ~/inc/overrides/lite/rest/Folder.php file which allows author-level attackers to inject arbitrary web scripts in folder names, in versions up to and including 4.14.1.
Fixes

Solution

Update to version 4.14.2 or newer.


Workaround

No workaround given by the vendor.

History

Mon, 05 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-05-05T14:52:36.007Z

Reserved: 2021-06-10T00:00:00.000Z

Link: CVE-2021-34668

cve-icon Vulnrichment

Updated: 2024-08-04T00:19:47.930Z

cve-icon NVD

Status : Modified

Published: 2021-08-30T19:15:08.813

Modified: 2024-11-21T06:10:55.833

Link: CVE-2021-34668

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.