The Strong Testimonials WordPress plugin before 3.1.12 does not validate and escape some of its Testimonial fields before outputting them back in a page/post, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. The attack requires a specific view to be performed
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 08 May 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpchill
Wpchill strong Testimonials |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:wpchill:strong_testimonials:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpchill
Wpchill strong Testimonials |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-01T20:05:08.497Z
Reserved: 2024-04-03T08:56:48.610Z
Link: CVE-2024-3261
Updated: 2024-08-01T20:05:08.497Z
Status : Analyzed
Published: 2024-04-24T05:15:47.207
Modified: 2025-05-08T19:12:36.187
Link: CVE-2024-3261
No data.
OpenCVE Enrichment
No data.
Weaknesses