### [CVE-2021-24413](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24413) ![](https://img.shields.io/static/v1?label=Product&message=Easy%20Twitter%20Feed&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.2%3C%201.2%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen) ### Description The Easy Twitter Feed WordPress plugin before 1.2 does not sanitise or validate the parameters from its shortcode, allowing users with a role as low as contributor to set Cross-Site Scripting payload in them which will be triggered in the page/s with the embed malicious shortcode ### POC #### Reference - https://wpscan.com/vulnerability/ce6d17c3-6741-4c80-ab13-e1824960ae24 #### Github No PoCs found on GitHub currently.