{"id":7452,"date":"2022-01-25T18:06:42","date_gmt":"2022-01-26T01:06:42","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7452"},"modified":"2024-04-23T09:42:02","modified_gmt":"2024-04-23T16:42:02","slug":"securin-discovers-a-xss-vulnerability-in-wordpress-post-duplicator-plugin","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/securin-discovers-a-xss-vulnerability-in-wordpress-post-duplicator-plugin\/","title":{"rendered":"Securin Discovers a XSS Vulnerability in WordPress Post Duplicator Plugin"},"content":{"rendered":"\t\t
Securin discovered and reported a Stored Cross-Site Scripting vulnerability in WordPress Post Duplicator Plugin that allows an authenticated attacker to inject a JavaScript payload into a trusted URL. This vulnerability has been credited with a CVE Identifier of CVE-2021-33852 and is rated as a medium severity with a CVSS v3 score of 6.1.<\/p>
Post Duplicator is one of the most popular WordPress plugins, with over 200 thousand installations where users can clone posts of any type or copy them to new files for additional editing. Therefore, making this vulnerability seeks an immediate attention.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
The following vulnerability was discovered in Post-Duplicator Plugin 2.23.<\/p>
Affected Product<\/p><\/td> | Post Duplicator version 2.23<\/p><\/td><\/tr> |
WordPress Version tested<\/p><\/td> | WordPress 5.8.2<\/p><\/td><\/tr> |