
Cloud Vulnerability DB
A community-led vulnerabilities database
The ThinkTwit WordPress plugin before version 1.7.1 contained a Stored Cross-Site Scripting (XSS) vulnerability. The issue was discovered in the plugin's "Consumer key" setting functionality, where the plugin failed to properly sanitize or escape input before outputting it on its settings page (WPScan).
The vulnerability is classified as a Stored Cross-Site Scripting (XSS) issue with a CVSS score of 3.5 (low severity). The vulnerability is tracked as CVE-2021-24582 and is categorized under CWE-79. The security flaw exists in the plugin's settings page where the "Consumer key" parameter lacks proper input sanitization and output escaping mechanisms (WPScan).
When exploited, this vulnerability allows authenticated attackers to inject and store malicious JavaScript code through the "Consumer key" setting. When an administrator accesses the settings page, the stored malicious code executes in their browser context, potentially leading to unauthorized actions or data theft (WPScan).
The vulnerability has been patched in version 1.7.1 of the ThinkTwit plugin. Users are advised to update to this version or later to protect against this security issue (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."