The Strong Testimonials WordPress plugin before 3.1.12 does not validate and escape some of its Testimonial fields before outputting them back in a page/post, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. The attack requires a specific view to be performed
History

Thu, 08 May 2025 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Wpchill
Wpchill strong Testimonials
Weaknesses CWE-79
CPEs cpe:2.3:a:wpchill:strong_testimonials:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpchill
Wpchill strong Testimonials

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2024-04-24T05:00:03.121Z

Updated: 2024-08-01T20:05:08.497Z

Reserved: 2024-04-03T08:56:48.610Z

Link: CVE-2024-3261

cve-icon Vulnrichment

Updated: 2024-08-01T20:05:08.497Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-24T05:15:47.207

Modified: 2025-05-08T19:12:36.187

Link: CVE-2024-3261

cve-icon Redhat

No data.