{"vulnerability": "CVE-2021-3466", "sightings": [{"uuid": "0f745575-bc01-416a-9df5-a189c8dc901a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34665", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17472", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-34665\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The WP SEO Tags WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the saq_txt_the_filter parameter in the ~/wp-seo-tags.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.2.7.\n\ud83d\udccf Published: 2021-08-16T18:22:46.073Z\n\ud83d\udccf Modified: 2025-05-23T20:01:06.887Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34665\n2. https://plugins.trac.wordpress.org/browser/wp-seo-tags/trunk/wp-seo-tags.php#L378", "creation_timestamp": "2025-05-23T20:49:35.000000Z"}, {"uuid": "6cb67d55-0714-4572-be07-5a9940b3dd17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34660", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17462", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-34660\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The WP Fusion Lite WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the startdate parameter found in the ~/includes/admin/logging/class-log-table-list.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.37.18.\n\ud83d\udccf Published: 2021-08-09T12:23:26.100Z\n\ud83d\udccf Modified: 2025-05-23T20:11:00.382Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34660\n2. https://plugins.trac.wordpress.org/browser/wp-fusion-lite/trunk/includes/admin/logging/class-log-table-list.php?rev=2497097#L427", "creation_timestamp": "2025-05-23T20:46:27.000000Z"}, {"uuid": "875497dd-03be-469f-8e14-1da95c4da54f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34661", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17461", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-34661\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L)\n\ud83d\udd39 Description: The WP Fusion Lite WordPress plugin is vulnerable to Cross-Site Request Forgery via the `show_logs_section` function found in the ~/includes/admin/logging/class-log-handler.php file which allows attackers to drop all logs for the plugin, in versions up to and including 3.37.18.\n\ud83d\udccf Published: 2021-08-09T12:23:20.384Z\n\ud83d\udccf Modified: 2025-05-23T20:11:24.408Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34661\n2. https://plugins.trac.wordpress.org/browser/wp-fusion-lite/trunk/includes/admin/logging/class-log-handler.php?rev=2533608#L302", "creation_timestamp": "2025-05-23T20:45:58.000000Z"}, {"uuid": "ad6d5f26-805d-4e5e-9905-5e050e3d6580", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34663", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17469", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-34663\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The jQuery Tagline Rotator WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/jquery-tagline-rotator.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.1.5.\n\ud83d\udccf Published: 2021-08-16T18:22:40.032Z\n\ud83d\udccf Modified: 2025-05-23T20:02:35.807Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34663\n2. https://plugins.trac.wordpress.org/browser/jquery-tagline-rotator/trunk/jquery-tagline-rotator.php#L166", "creation_timestamp": "2025-05-23T20:49:25.000000Z"}, {"uuid": "f1f68ea6-1ab5-4992-a331-b24cc9437c42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34664", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17471", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-34664\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: The Moova for WooCommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the lat parameter in the ~/Checkout/Checkout.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.5.\n\ud83d\udccf Published: 2021-08-16T18:22:43.815Z\n\ud83d\udccf Modified: 2025-05-23T20:01:30.178Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34664\n2. https://plugins.trac.wordpress.org/browser/moova-for-woocommerce/tags/3.5/Checkout/Checkout.php#L57", "creation_timestamp": "2025-05-23T20:49:34.000000Z"}, {"uuid": "3d03673f-693b-4731-9822-26014b5ec352", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34661", "type": "seen", "source": "https://t.me/cibsecurity/27011", "content": "\u203c CVE-2021-34661 \u203c\n\nThe WP Fusion Lite WordPress plugin is vulnerable to Cross-Site Request Forgery via the `show_logs_section` function found in the ~/includes/admin/logging/class-log-handler.php file which allows attackers to drop all logs for the plugin, in versions up to and including 3.37.18.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-09T16:36:56.000000Z"}, {"uuid": "3cbdf09e-588d-4f7b-ae8f-5ab047c6f1b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34660", "type": "seen", "source": "https://t.me/cibsecurity/27009", "content": "\u203c CVE-2021-34660 \u203c\n\nThe WP Fusion Lite WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the startdate parameter found in the ~/includes/admin/logging/class-log-table-list.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.37.18.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-09T16:36:55.000000Z"}, {"uuid": "341b93bb-235b-45e3-90aa-1fc8c513c67b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34666", "type": "seen", "source": "https://t.me/cibsecurity/27411", "content": "\u203c CVE-2021-34666 \u203c\n\nThe Add Sidebar WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the add parameter in the ~/wp_sidebarMenu.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-16T22:15:13.000000Z"}, {"uuid": "3de2e2b4-cddf-440e-9d45-543da65e05c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34664", "type": "seen", "source": "https://t.me/cibsecurity/27394", "content": "\u203c CVE-2021-34664 \u203c\n\nThe Moova for WooCommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the lat parameter in the ~/Checkout/Checkout.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-16T22:14:52.000000Z"}]}