SB2021081810 - Multiple vulnerabilities in Custom Post Type Relations plugin for WordPress
Published: August 18, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2021-34654)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the "cptr[name]" parameter in the ~/pages/admin-page.php file. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Cross-site scripting (CVE-ID: CVE-2021-34655)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the "cptr[name]" parameter in the ~/pages/admin-page.php file. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34654
- https://plugins.trac.wordpress.org/browser/custom-post-type-relations/trunk/pages/admin-page.php#L60
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34655
- https://plugins.trac.wordpress.org/browser/wp-songbook/tags/2.0.11/inc/class.ajax.php#L21