The Strong Testimonials WordPress plugin before 3.1.12 does not validate and escape some of its Testimonial fields before outputting them back in a page/post, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. The attack requires a specific view to be performed
Metrics
Affected Vendors & Products
References
History
Thu, 08 May 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wpchill
Wpchill strong Testimonials |
|
Weaknesses | CWE-79 | |
CPEs | cpe:2.3:a:wpchill:strong_testimonials:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Wpchill
Wpchill strong Testimonials |

Status: PUBLISHED
Assigner: WPScan
Published: 2024-04-24T05:00:03.121Z
Updated: 2024-08-01T20:05:08.497Z
Reserved: 2024-04-03T08:56:48.610Z
Link: CVE-2024-3261

Updated: 2024-08-01T20:05:08.497Z

Status : Analyzed
Published: 2024-04-24T05:15:47.207
Modified: 2025-05-08T19:12:36.187
Link: CVE-2024-3261

No data.