Vulnerabilites related to Unknown - Social Sharing Plugin – Sassy Social Share
CVE-2021-24746 (GCVE-0-2021-24746)
Vulnerability from cvelistv5
Published
2022-03-28 17:20
Modified
2024-08-03 19:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
The Social Sharing Plugin WordPress plugin before 3.3.40 does not escape the viewed post URL before outputting it back in onclick attributes when the "Enable 'More' icon" option is enabled (which is the default setting), leading to a Reflected Cross-Site Scripting issue.
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/99f4fb32-e312-4059-adaf-f4cbaa92d4fa | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Social Sharing Plugin – Sassy Social Share |
Version: 3.3.40 < 3.3.40 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:42:16.645Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/99f4fb32-e312-4059-adaf-f4cbaa92d4fa" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Social Sharing Plugin \u2013 Sassy Social Share", "vendor": "Unknown", "versions": [ { "lessThan": "3.3.40", "status": "affected", "version": "3.3.40", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Paul J. Martinez" } ], "descriptions": [ { "lang": "en", "value": "The Social Sharing Plugin WordPress plugin before 3.3.40 does not escape the viewed post URL before outputting it back in onclick attributes when the \"Enable \u0027More\u0027 icon\" option is enabled (which is the default setting), leading to a Reflected Cross-Site Scripting issue." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-28T17:20:47", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/99f4fb32-e312-4059-adaf-f4cbaa92d4fa" } ], "source": { "discovery": "EXTERNAL" }, "title": "Sassy Social Share \u003c 3.3.40 - Reflected Cross-Site Scripting", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24746", "STATE": "PUBLIC", "TITLE": "Sassy Social Share \u003c 3.3.40 - Reflected Cross-Site Scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Social Sharing Plugin \u2013 Sassy Social Share", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.3.40", "version_value": "3.3.40" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Paul J. Martinez" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Social Sharing Plugin WordPress plugin before 3.3.40 does not escape the viewed post URL before outputting it back in onclick attributes when the \"Enable \u0027More\u0027 icon\" option is enabled (which is the default setting), leading to a Reflected Cross-Site Scripting issue." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/99f4fb32-e312-4059-adaf-f4cbaa92d4fa", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/99f4fb32-e312-4059-adaf-f4cbaa92d4fa" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24746", "datePublished": "2022-03-28T17:20:47", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:42:16.645Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }