
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2021-24218 affects the Facebook for WordPress plugin versions 3.0.0 through 3.0.3. The issue was discovered and publicly disclosed on March 25, 2021, by security researcher Chloe Chamberland. The vulnerability involves CSRF (Cross-Site Request Forgery) issues in the plugin's AJAX actions wpajaxsavefbesettings and wpajaxdeletefbesettings, combined with a stored XSS vulnerability in the settings functionality (WPScan, Wordfence).
The vulnerability stems from two main issues: first, the AJAX actions lack proper nonce protection, making them susceptible to CSRF attacks. Second, the saveFbeSettings function does not implement proper sanitization, allowing for the injection of script tags. The vulnerability has been assigned a CVSS score of 8.8 (High) and is classified under CWE-352. The issue falls under the OWASP Top 10 category A2: Broken Authentication and Session Management (WPScan).
The combination of CSRF and stored XSS vulnerabilities allows attackers to potentially execute malicious scripts in the context of the affected WordPress site and delete plugin settings. This could lead to unauthorized modifications of the Facebook for WordPress plugin configuration and potential execution of arbitrary JavaScript code in users' browsers (Wordfence).
The vulnerability was patched in version 3.0.4 of the Facebook for WordPress plugin. Site administrators running affected versions should update to version 3.0.4 or later to mitigate the risk (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."