The MPL-Publisher WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/libs/PublisherController.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.30.2. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
History

Fri, 25 Apr 2025 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Mpl-publisher
Mpl-publisher mpl-publisher
CPEs cpe:2.3:a:mpl-publisher_project:mpl-publisher:*:*:*:*:*:wordpress:*:* cpe:2.3:a:mpl-publisher:mpl-publisher:*:*:*:*:*:wordpress:*:*
Vendors & Products Mpl-publisher Project
Mpl-publisher Project mpl-publisher
Mpl-publisher
Mpl-publisher mpl-publisher

Fri, 14 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2021-10-19T14:14:56.445Z

Updated: 2025-02-14T17:53:05.336Z

Reserved: 2021-08-20T00:00:00.000Z

Link: CVE-2021-39343

cve-icon Vulnrichment

Updated: 2024-08-04T02:06:42.441Z

cve-icon NVD

Status : Modified

Published: 2021-10-19T15:15:07.877

Modified: 2025-04-25T19:11:59.100

Link: CVE-2021-39343

cve-icon Redhat

No data.