{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T16:13:53.174","vulnerabilities":[{"cve":{"id":"CVE-2021-24162","sourceIdentifier":"contact@wpscan.com","published":"2021-04-05T19:15:15.233","lastModified":"2024-11-21T05:52:29.907","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into importing all new settings. These settings could be modified to include malicious JavaScript, therefore allowing an attacker to inject payloads that could aid in further infection of the site."},{"lang":"es","value":"En los plugins de WordPress Reponsive Menu (free y Pro) versiones anteriores a 4.0.4, los atacantes podían diseñar una petición y engañar a un administrador para que importara todas las configuraciones nuevas.&#xa0;Esta configuración podría modificarse para incluir JavaScript malicioso, lo que permitiría a un atacante inyectar cargas útiles que podrían ayudar en una mayor infección del sitio"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"contact@wpscan.com","type":"Secondary","description":[{"lang":"en","value":"CWE-352"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:expresstech:responsive_menu:*:*:*:*:free:wordpress:*:*","versionEndExcluding":"4.0.4","matchCriteriaId":"36CF966E-25C0-408C-A993-0FAF0AF9FC31"},{"vulnerable":true,"criteria":"cpe:2.3:a:expresstech:responsive_menu:*:*:*:*:pro:wordpress:*:*","versionEndExcluding":"4.0.4","matchCriteriaId":"B045BC14-6B45-4707-B41C-D1447BBECE04"}]}]}],"references":[{"url":"https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5","source":"contact@wpscan.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/","source":"contact@wpscan.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}