id: CVE-2021-24987 info: name: WordPress Super Socializer <7.13.30 - Cross-Site Scripting author: Akincibor severity: medium description: WordPress Super Socializer plugin before 7.13.30 contains a reflected cross-site scripting vulnerability. It does not sanitize and escape the urls parameter in its the_champ_sharing_count AJAX action (available to both unauthenticated and authenticated users) before outputting it back in the response. impact: | Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website. remediation: | Update to the latest version of the WordPress Super Socializer plugin (7.13.30 or higher) to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/a14b668f-812f-46ee-827e-0996b378f7f0 - https://nvd.nist.gov/vuln/detail/CVE-2021-24987 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-24987 cwe-id: CWE-79 epss-score: 0.00086 epss-percentile: 0.35299 cpe: cpe:2.3:a:heateor:super_socializer:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: heateor product: super_socializer framework: wordpress tags: cve2021,cve,wpscan,xss,wp,wp-plugin,wordpress,heateor http: - method: GET path: - '{{BaseURL}}/wp-admin/admin-ajax.php?action=the_champ_sharing_count&urls[]=' matchers-condition: and matchers: - type: word part: body words: - '{"facebook_urls":[[""]]' - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 4a0a00473045022072d7507fe3f98f145bb0366d01ee315c4090c40e04ea184f4563ab190e401a7e022100c4dacb7acbb47c6a77145ea140e5e68f4bfb3a15cbbfca8f3fe70afdc48dbbb7:922c64590222798bb761d5b6d8e72950