The Fantastic ElasticSearch WordPress plugin through 4.1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/693f4cc4-a082-46bc-abc9-a08919f70157/ | Exploit Third Party Advisory |
Configurations
History
12 May 2025, 00:25
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Parisholley
Parisholley fantastic Elasticsearch |
|
| CPE | cpe:2.3:a:parisholley:fantastic_elasticsearch:*:*:*:*:*:wordpress:*:* | |
| References | () https://wpscan.com/vulnerability/693f4cc4-a082-46bc-abc9-a08919f70157/ - Exploit, Third Party Advisory |
31 Jan 2025, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-01-31 06:15
Updated : 2025-05-12 00:25
NVD link : CVE-2024-13221
Mitre link : CVE-2024-13221
JSON object : View
Products Affected
parisholley
- fantastic_elasticsearch
CWE
No CWE.
