Description
The Strong Testimonials WordPress plugin before 3.1.12 does not validate and escape some of its Testimonial fields before outputting them back in a page/post, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. The attack requires a specific view to be performed
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 08 May 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpchill
Wpchill strong Testimonials |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:wpchill:strong_testimonials:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpchill
Wpchill strong Testimonials |
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-01T20:05:08.497Z
Reserved: 2024-04-03T08:56:48.610Z
Link: CVE-2024-3261
Updated: 2024-08-01T20:05:08.497Z
Status : Analyzed
Published: 2024-04-24T05:15:47.207
Modified: 2025-05-08T19:12:36.187
Link: CVE-2024-3261
No data.
OpenCVE Enrichment
No data.
Weaknesses