
Cloud Vulnerability DB
A community-led vulnerabilities database
The Weather Effect WordPress plugin before version 1.3.4 was identified with a security vulnerability tracked as CVE-2021-24683. The vulnerability was discovered and reported by researcher apple502j, and was publicly disclosed on September 7, 2021. The issue affects the plugin's settings functionality in WordPress installations (WPScan).
The vulnerability combines Cross-Site Request Forgery (CSRF) and Stored Cross-Site Scripting (XSS) issues. The plugin lacked CSRF protection mechanisms when saving settings and failed to properly validate or escape the saved data. The vulnerability received a CVSS score of 8.8 (High) and is classified under CWE-352, relating to CSRF, and aligns with OWASP Top 10 category A2: Broken Authentication and Session Management (WPScan).
The vulnerability could allow attackers to execute stored cross-site scripting attacks through the plugin's settings. The XSS payload could be triggered both in the frontend and backend of the WordPress installation, potentially affecting both site visitors and administrators (WPScan).
The vulnerability was addressed in version 1.3.4 of the Weather Effect plugin, which fixed the CSRF issue. However, it's worth noting that the sanitization and escaping were not fully addressed in this version, leading to a separate security issue being tracked (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."