CVE-2021-24330

Funnel Builder by CartFlows <= 1.6.12 - Authenticated Stored Cross-Site scripting via FB Pixel ID and Google Analytics ID

mediumImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
4.8
CVSS Score
4.8
CVSS Score
medium
Severity
1.6.13
Patched in
981d
Time to patch

Description

The Funnel Builder by CartFlows – Create High Converting Sales Funnels For WordPress plugin before 1.6.13 did not sanitise its facebook_pixel_id and google_analytics_id settings, allowing high privilege users to set XSS payload in them, which will either be executed on pages generated by the plugin, or the whole website depending on the settings used.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Changed
Low
Confidentiality
Low
Integrity
None
Availability

Technical Details

Affected versions<1.6.13
PublishedMay 17, 2021
Last updatedJanuary 22, 2024
Affected plugincartflows

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.