Description
The Real WYSIWYG WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of PHP_SELF in the ~/real-wysiwyg.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.2.
No analysis available yet.
Remediation
Vendor Solution
Uninstall plugin from WordPress site.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-25671 | The Real WYSIWYG WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of PHP_SELF in the ~/real-wysiwyg.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.2. |
References
History
Fri, 31 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-01-31T18:58:41.250Z
Reserved: 2021-08-20T00:00:00.000Z
Link: CVE-2021-39310
Updated: 2024-08-04T02:06:42.458Z
Status : Modified
Published: 2021-12-14T16:15:08.480
Modified: 2024-11-21T06:19:12.187
Link: CVE-2021-39310
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD