Description
The SP Project & Document Manager WordPress plugin is vulnerable to attribute-based Reflected Cross-Site Scripting via the from and to parameters in the ~/functions.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 4.25.
No analysis available yet.
Remediation
Vendor Solution
Uninstall the WordPress plugin.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-24768 | The SP Project & Document Manager WordPress plugin is vulnerable to attribute-based Reflected Cross-Site Scripting via the from and to parameters in the ~/functions.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 4.25. |
References
History
Mon, 05 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-05-05T18:15:07.517Z
Reserved: 2021-08-09T00:00:00.000Z
Link: CVE-2021-38315
Updated: 2024-08-04T01:37:16.337Z
Status : Modified
Published: 2021-08-16T19:15:15.893
Modified: 2024-11-21T06:16:46.773
Link: CVE-2021-38315
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD