CVE-2021-39343
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
19/10/2021
Last modified:
25/04/2025
Description
The MPL-Publisher WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/libs/PublisherController.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.30.2. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
3.50
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:mpl-publisher:mpl-publisher:*:*:*:*:*:wordpress:*:* | 1.30.2 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/BigTiger2020/word-press/blob/main/MPL-Publisher.md
- https://plugins.trac.wordpress.org/browser/mpl-publisher/trunk/libs/PublisherController.php#L35
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39343
- https://github.com/BigTiger2020/word-press/blob/main/MPL-Publisher.md
- https://plugins.trac.wordpress.org/browser/mpl-publisher/trunk/libs/PublisherController.php#L35
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39343