Vulnerabilities and security researches forprismatic prismatic
Direction: ascendingJun 07, 2024
Prismatic # CVE-2021-24408
- CVE, Research URL
- Home page URL
- Application
- Date
- Jul 13, 2021
- Research Description
- The Prismatic WordPress plugin before 2.8 does not sanitise or validate some of its shortcode parameters, allowing users with a role as low as Contributor to set Cross-Site payload in them. A post made by a contributor would still have to be approved by an admin to have the XSS trigger able in the frontend, however, higher privilege users, such as editor could exploit this without the need of approval, and even when the blog disallows the unfiltered_html capability.
- Affected versions
-
max 2.8.
- Status
-
vulnerable
Prismatic # CVE-2021-24409
- CVE, Research URL
- Home page URL
- Application
- Date
- Jul 13, 2021
- Research Description
- The Prismatic WordPress plugin before 2.8 does not escape the 'tab' GET parameter before outputting it back in an attribute, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administrator
- Affected versions
-
max 2.8.
- Status
-
vulnerable
Apr 16, 2026
Prismatic # CVE-2026-3876
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 16, 2026
- Research Description
- The Prismatic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'prismatic_encoded' pseudo-shortcode in all versions up to, and including, 3.7.3. This is due to insufficient input sanitization and output escaping on user-supplied attributes within the 'prismatic_decode' function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page by submitting a comment containing a crafted 'prismatic_encoded' pseudo-shortcode.
- Affected versions
-
max 3.7.4.
- Status
-
vulnerable