
Cloud Vulnerability DB
A community-led vulnerabilities database
The PDF.js Viewer WordPress plugin (CVE-2021-24759) is a security vulnerability discovered in versions before 2.0.2. The vulnerability was publicly disclosed on November 8, 2021, and involves unescaped shortcode and Gutenberg Block attributes that could enable Cross-Site Scripting (XSS) attacks. Users with roles as low as Contributor could potentially exploit this vulnerability (WPScan Advisory).
The vulnerability is classified as a Cross-Site Scripting (XSS) issue, specifically CWE-79 (Improper Neutralization of Input During Web Page Generation). It received a CVSS v3.1 base score of 5.4 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. The vulnerability exists due to improper escaping of shortcode and Gutenberg Block attributes in the plugin (NVD Database).
The vulnerability allows attackers with Contributor-level access or higher to perform Cross-Site Scripting attacks through the manipulation of shortcode and Gutenberg Block attributes. This could potentially lead to the execution of malicious JavaScript code in users' browsers (WPScan Advisory).
The vulnerability has been patched in version 2.0.2 of the PDF.js Viewer WordPress plugin. Users are advised to update to this version or later to mitigate the risk (WPScan Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."