All the vulnerabilites related to Hector Cabrera - WordPress Popular Posts
jvndb-2022-000091
Vulnerability from jvndb
Published
2022-11-18 15:14
Modified
2022-11-18 15:14
Severity ?
Summary
WordPress Plugin "WordPress Popular Posts" accepts untrusted external inputs to update certain internal variables
Details
WordPress Plugin "WordPress Popular Posts" provided by Hector Cabrera accepts untrusted external inputs to update certain internal variables (CWE-454).
Tsubasa Iinuma of Origami Systems reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Hector Cabrera | WordPress Popular Posts |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000091.html", "dc:date": "2022-11-18T15:14+09:00", "dcterms:issued": "2022-11-18T15:14+09:00", "dcterms:modified": "2022-11-18T15:14+09:00", "description": "WordPress Plugin \"WordPress Popular Posts\" provided by Hector Cabrera accepts untrusted external inputs to update certain internal variables (CWE-454).\r\n\r\nTsubasa Iinuma of Origami Systems reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000091.html", "sec:cpe": { "#text": "cpe:/a:wordpress_popular_posts_project:wordpress_popular_posts", "@product": "WordPress Popular Posts", "@vendor": "Hector Cabrera", "@version": "2.2" }, "sec:cvss": [ { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "5.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2022-000091", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN13927745/index.html", "@id": "JVN#13927745", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-43468", "@id": "CVE-2022-43468", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-43468", "@id": "CVE-2022-43468", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "WordPress Plugin \"WordPress Popular Posts\" accepts untrusted external inputs to update certain internal variables" }
jvndb-2021-000056
Vulnerability from jvndb
Published
2021-06-30 11:36
Modified
2021-06-30 11:36
Severity ?
Summary
WordPress Plugin "WordPress Popular Posts" vulnerable to cross-site scripting
Details
WordPress Plugin "WordPress Popular Posts" provided by Hector Cabrera contains a cross-site scripting vulnerability (CWE-79).
Yu Iwama of Secure Sky Technology Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN63066062/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20746 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2021-20746 | |
Cross-site Scripting(CWE-79) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
Hector Cabrera | WordPress Popular Posts |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000056.html", "dc:date": "2021-06-30T11:36+09:00", "dcterms:issued": "2021-06-30T11:36+09:00", "dcterms:modified": "2021-06-30T11:36+09:00", "description": "WordPress Plugin \"WordPress Popular Posts\" provided by Hector Cabrera contains a cross-site scripting vulnerability (CWE-79).\r\n\r\nYu Iwama of Secure Sky Technology Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000056.html", "sec:cpe": { "#text": "cpe:/a:wordpress_popular_posts_project:wordpress_popular_posts", "@product": "WordPress Popular Posts", "@vendor": "Hector Cabrera", "@version": "2.2" }, "sec:cvss": [ { "@score": "3.5", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "5.4", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2021-000056", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN63066062/index.html", "@id": "JVN#63066062", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20746", "@id": "CVE-2021-20746", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20746", "@id": "CVE-2021-20746", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "WordPress Plugin \"WordPress Popular Posts\" vulnerable to cross-site scripting" }
cve-2023-45607
Vulnerability from cvelistv5
Published
2023-10-18 13:13
Modified
2024-08-02 20:21
Severity ?
EPSS score ?
Summary
WordPress WordPress Popular Posts Plugin <= 6.3.2 is vulnerable to Cross Site Scripting (XSS)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Hector Cabrera | WordPress Popular Posts |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.741Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://patchstack.com/database/vulnerability/wordpress-popular-posts/wordpress-popular-posts-plugin-6-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "packageName": "wordpress-popular-posts", "product": "WordPress Popular Posts", "vendor": "Hector Cabrera", "versions": [ { "changes": [ { "at": "6.3.3", "status": "unaffected" } ], "lessThanOrEqual": "6.3.2", "status": "affected", "version": "n/a", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Rafie Muhammad (Patchstack)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Hector Cabrera WordPress Popular Posts plugin \u0026lt;=\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;6.3.2 versions.\u003c/span\u003e" } ], "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Hector Cabrera WordPress Popular Posts plugin \u003c=\u00a06.3.2 versions." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-18T13:13:17.797Z", "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", "shortName": "Patchstack" }, "references": [ { "tags": [ "vdb-entry" ], "url": "https://patchstack.com/database/vulnerability/wordpress-popular-posts/wordpress-popular-posts-plugin-6-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to\u0026nbsp;6.3.3 or a higher version." } ], "value": "Update to\u00a06.3.3 or a higher version." } ], "source": { "discovery": "EXTERNAL" }, "title": "WordPress WordPress Popular Posts Plugin \u003c= 6.3.2 is vulnerable to Cross Site Scripting (XSS)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", "assignerShortName": "Patchstack", "cveId": "CVE-2023-45607", "datePublished": "2023-10-18T13:13:17.797Z", "dateReserved": "2023-10-09T10:11:54.307Z", "dateUpdated": "2024-08-02T20:21:16.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43468
Vulnerability from cvelistv5
Published
2022-12-07 00:00
Modified
2025-04-23 18:15
Severity ?
EPSS score ?
Summary
External initialization of trusted variables or data stores vulnerability exists in WordPress Popular Posts 6.0.5 and earlier, therefore the vulnerable product accepts untrusted external inputs to update certain internal variables. As a result, the number of views for an article may be manipulated through a crafted input.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Hector Cabrera | WordPress Popular Posts |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:32:59.916Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://wordpress.org/plugins/wordpress-popular-posts/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/cabrerahector/wordpress-popular-posts/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN13927745/index.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-43468", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T18:14:52.782920Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-665", "description": "CWE-665 Improper Initialization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-23T18:15:21.717Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WordPress Popular Posts", "vendor": "Hector Cabrera", "versions": [ { "status": "affected", "version": "6.0.5 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "External initialization of trusted variables or data stores vulnerability exists in WordPress Popular Posts 6.0.5 and earlier, therefore the vulnerable product accepts untrusted external inputs to update certain internal variables. As a result, the number of views for an article may be manipulated through a crafted input." } ], "problemTypes": [ { "descriptions": [ { "description": "External Initialization of Trusted Variables or Data Stores", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-07T00:00:00.000Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://wordpress.org/plugins/wordpress-popular-posts/" }, { "url": "https://github.com/cabrerahector/wordpress-popular-posts/" }, { "url": "https://jvn.jp/en/jp/JVN13927745/index.html" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2022-43468", "datePublished": "2022-12-07T00:00:00.000Z", "dateReserved": "2022-11-16T00:00:00.000Z", "dateUpdated": "2025-04-23T18:15:21.717Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36872
Vulnerability from cvelistv5
Published
2021-09-23 15:00
Modified
2025-03-28 16:55
Severity ?
EPSS score ?
Summary
WordPress Popular Posts plugin <= 5.3.3 - Authenticated Persistent Cross-Site Scripting (XSS) vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Hector Cabrera | WordPress Popular Posts |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:01:59.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/cabrerahector/wordpress-popular-posts/blob/master/changelog.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://patchstack.com/database/vulnerability/wordpress-popular-posts/wordpress-popular-posts-plugin-5-3-3-authenticated-persistent-cross-site-scripting-xss-vulnerability" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-36872", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-28T16:54:33.992986Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-28T16:55:01.742Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WordPress Popular Posts", "vendor": "Hector Cabrera", "versions": [ { "lessThanOrEqual": "5.3.3", "status": "affected", "version": "5.3.3", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Original researcher - Vlad Visse (Patchstack Red Team)" } ], "datePublic": "2021-07-04T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Authenticated Persistent Cross-Site Scripting (XSS) vulnerability in WordPress Popular Posts plugin (versions \u003c= 5.3.3). Vulnerable at \u0026widget-wpp[2][post_type]." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-23T15:00:55.000Z", "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", "shortName": "Patchstack" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/cabrerahector/wordpress-popular-posts/blob/master/changelog.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://patchstack.com/database/vulnerability/wordpress-popular-posts/wordpress-popular-posts-plugin-5-3-3-authenticated-persistent-cross-site-scripting-xss-vulnerability" } ], "solutions": [ { "lang": "en", "value": "Update to version 5.3.4 or higher." } ], "source": { "discovery": "EXTERNAL" }, "title": "WordPress Popular Posts plugin \u003c= 5.3.3 - Authenticated Persistent Cross-Site Scripting (XSS) vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "audit@patchstack.com", "DATE_PUBLIC": "2021-07-04T20:59:00.000Z", "ID": "CVE-2021-36872", "STATE": "PUBLIC", "TITLE": "WordPress Popular Posts plugin \u003c= 5.3.3 - Authenticated Persistent Cross-Site Scripting (XSS) vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WordPress Popular Posts", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "5.3.3", "version_value": "5.3.3" } ] } } ] }, "vendor_name": "Hector Cabrera" } ] } }, "credit": [ { "lang": "eng", "value": "Original researcher - Vlad Visse (Patchstack Red Team)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Authenticated Persistent Cross-Site Scripting (XSS) vulnerability in WordPress Popular Posts plugin (versions \u003c= 5.3.3). Vulnerable at \u0026widget-wpp[2][post_type]." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/cabrerahector/wordpress-popular-posts/blob/master/changelog.md", "refsource": "CONFIRM", "url": "https://github.com/cabrerahector/wordpress-popular-posts/blob/master/changelog.md" }, { "name": "https://patchstack.com/database/vulnerability/wordpress-popular-posts/wordpress-popular-posts-plugin-5-3-3-authenticated-persistent-cross-site-scripting-xss-vulnerability", "refsource": "MISC", "url": "https://patchstack.com/database/vulnerability/wordpress-popular-posts/wordpress-popular-posts-plugin-5-3-3-authenticated-persistent-cross-site-scripting-xss-vulnerability" } ] }, "solution": [ { "lang": "en", "value": "Update to version 5.3.4 or higher." } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", "assignerShortName": "Patchstack", "cveId": "CVE-2021-36872", "datePublished": "2021-09-23T15:00:55.804Z", "dateReserved": "2021-07-19T00:00:00.000Z", "dateUpdated": "2025-03-28T16:55:01.742Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-20746
Vulnerability from cvelistv5
Published
2021-06-28 00:50
Modified
2024-08-03 17:53
Severity ?
EPSS score ?
Summary
Cross-site scripting vulnerability in WordPress Popular Posts 5.3.2 and earlier allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://wordpress.org/plugins/wordpress-popular-posts/ | x_refsource_MISC | |
https://cabrerahector.com/wordpress/wordpress-popular-posts-5-3-improved-php-8-support-retina-display-support-and-more/#minor-updates-and-hotfixes | x_refsource_MISC | |
https://cabrerahector.com/ | x_refsource_MISC | |
https://jvn.jp/en/jp/JVN63066062/index.html | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Hector Cabrera | WordPress Popular Posts |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:53:21.923Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wordpress.org/plugins/wordpress-popular-posts/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cabrerahector.com/wordpress/wordpress-popular-posts-5-3-improved-php-8-support-retina-display-support-and-more/#minor-updates-and-hotfixes" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cabrerahector.com/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN63066062/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WordPress Popular Posts", "vendor": "Hector Cabrera", "versions": [ { "status": "affected", "version": "5.3.2 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in WordPress Popular Posts 5.3.2 and earlier allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-28T00:50:35", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wordpress.org/plugins/wordpress-popular-posts/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cabrerahector.com/wordpress/wordpress-popular-posts-5-3-improved-php-8-support-retina-display-support-and-more/#minor-updates-and-hotfixes" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cabrerahector.com/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/en/jp/JVN63066062/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2021-20746", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WordPress Popular Posts", "version": { "version_data": [ { "version_value": "5.3.2 and earlier" } ] } } ] }, "vendor_name": "Hector Cabrera" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in WordPress Popular Posts 5.3.2 and earlier allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://wordpress.org/plugins/wordpress-popular-posts/", "refsource": "MISC", "url": "https://wordpress.org/plugins/wordpress-popular-posts/" }, { "name": "https://cabrerahector.com/wordpress/wordpress-popular-posts-5-3-improved-php-8-support-retina-display-support-and-more/#minor-updates-and-hotfixes", "refsource": "MISC", "url": "https://cabrerahector.com/wordpress/wordpress-popular-posts-5-3-improved-php-8-support-retina-display-support-and-more/#minor-updates-and-hotfixes" }, { "name": "https://cabrerahector.com/", "refsource": "MISC", "url": "https://cabrerahector.com/" }, { "name": "https://jvn.jp/en/jp/JVN63066062/index.html", "refsource": "MISC", "url": "https://jvn.jp/en/jp/JVN63066062/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2021-20746", "datePublished": "2021-06-28T00:50:35", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-08-03T17:53:21.923Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }