Vulnerabilities and security researches forcustom-facebook-feed custom-facebook-feed
Direction: ascendingJun 07, 2024
Smash Balloon Social Post Feed # CVE-2022-4477
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 16, 2023
- Research Description
- The Smash Balloon Social Post Feed WordPress plugin before 4.1.6 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks against logged-in admins.
- Affected versions
-
max 2.19.2.
- Status
-
vulnerable
Smash Balloon Social Post Feed # CVE-2024-31379
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 15, 2024
- Research Description
- Cross-Site Request Forgery (CSRF) vulnerability in Smash Balloon Smash Balloon Social Post Feed.This issue affects Smash Balloon Social Post Feed: from n/a through 4.2.1.
- Affected versions
-
max 4.2.2.
- Status
-
vulnerable
Smash Balloon Social Post Feed # CVE-2021-25065
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 17, 2022
- Research Description
- The Smash Balloon Social Post Feed WordPress plugin before 4.1.1 was affected by a reflected XSS in custom-facebook-feed in cff-top admin page.
- Affected versions
-
max 4.1.1.
- Status
-
vulnerable
Smash Balloon Social Post Feed # CVE-2021-24508
- CVE, Research URL
- Home page URL
- Application
- Date
- Sep 13, 2021
- Research Description
- The Smash Balloon Social Post Feed WordPress plugin before 2.19.2 does not sanitise or escape the feedID POST parameter in its feed_locator AJAX action (available to both authenticated and unauthenticated users) before outputting a truncated version of it in the admin dashboard, leading to an unauthenticated Stored Cross-Site Scripting issue which will be executed in the context of a logged in administrator.
- Affected versions
-
max 2.19.2.
- Status
-
vulnerable
Smash Balloon Social Post Feed # CVE-2021-24918
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 29, 2021
- Research Description
- The Smash Balloon Social Post Feed WordPress plugin before 4.0.1 did not have any privilege or nonce validation before saving the plugin's setting. As a result, any logged-in user on a vulnerable site could update the settings and store rogue JavaScript on each of its posts and pages.
- Affected versions
-
max 4.0.1.
- Status
-
vulnerable
Jul 24, 2024
Smash Balloon Social Post Feed # PSC-2024-64399
- PSC, Research URL
- Home page URL
- Application
- Date
- Aug 05, 2025
- Research Description
- Enhance your WordPress site with a robust Facebook post display plugin that’s not only feature-rich but also prioritizes security. Smash Balloon Social Post Feed, now certified with the Plugin Security Certification (PSC) from CleanTalk, offers unparalleled customization options while maintaining top-notch security standards.
- Affected versions
-
Min 4.3.4, max 4.3.4.
- Status
-
SAFE & CERTIFIED
Jun 14, 2025
Smash Balloon Social Post Feed # CVE-2025-4577
- CVE, Research URL
- Home page URL
- Application
- Date
- Jun 10, 2025
- Research Description
- The Smash Balloon Social Post Feed – Simple Social Feeds for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the data-color attribute in all versions up to, and including, 4.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
max 4.3.2.
- Status
-
vulnerable
Dec 10, 2025
Smash Balloon Social Post Feed # CVE-2025-49937
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 22, 2025
- Research Description
- Missing Authorization vulnerability in Syed Balkhi Smash Balloon Social Post Feed custom-facebook-feed allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Smash Balloon Social Post Feed: from n/a through <= 4.3.2.
- Affected versions
-
max 4.3.2.
- Status
-
vulnerable