Vulnerability Details CVE-2021-24409
The Prismatic WordPress plugin before 2.8 does not escape the 'tab' GET parameter before outputting it back in an attribute, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administrator
Exploit prediction scoring system (EPSS) score
EPSS Score 0.133
EPSS Ranking 93.8%
CVSS Severity
CVSS v3 Score 6.1
CVSS v2 Score 4.3
Products affected by CVE-2021-24409
-
cpe:2.3:a:plugin-planet:prismatic:-
-
cpe:2.3:a:plugin-planet:prismatic:1.0
-
cpe:2.3:a:plugin-planet:prismatic:1.1
-
cpe:2.3:a:plugin-planet:prismatic:1.2
-
cpe:2.3:a:plugin-planet:prismatic:1.3
-
cpe:2.3:a:plugin-planet:prismatic:1.4
-
cpe:2.3:a:plugin-planet:prismatic:1.5
-
cpe:2.3:a:plugin-planet:prismatic:1.6
-
cpe:2.3:a:plugin-planet:prismatic:1.6.1
-
cpe:2.3:a:plugin-planet:prismatic:1.7
-
cpe:2.3:a:plugin-planet:prismatic:1.8
-
cpe:2.3:a:plugin-planet:prismatic:1.9
-
cpe:2.3:a:plugin-planet:prismatic:2.0
-
cpe:2.3:a:plugin-planet:prismatic:2.1
-
cpe:2.3:a:plugin-planet:prismatic:2.2
-
cpe:2.3:a:plugin-planet:prismatic:2.3
-
cpe:2.3:a:plugin-planet:prismatic:2.4
-
cpe:2.3:a:plugin-planet:prismatic:2.5
-
cpe:2.3:a:plugin-planet:prismatic:2.6
-
cpe:2.3:a:plugin-planet:prismatic:2.7