The 3D Cover Carousel WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter in the ~/cover-carousel.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.
                
            References
                    | Link | Resource | 
|---|---|
| https://plugins.trac.wordpress.org/browser/3d-cover-carousel/trunk/cover-carousel.php?rev=1522904#L733 | Exploit Third Party Advisory | 
| https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38318 | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2021-09-09 19:15
Updated : 2021-09-22 17:18
NVD link : CVE-2021-38318
Mitre link : CVE-2021-38318
CVE.ORG link : CVE-2021-38318
JSON object : View
Products Affected
                3d_cover_carousel_project
- 3d_cover_carousel
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
