cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forprismatic prismatic

Direction: descending
Apr 16, 2026

Prismatic # CVE-2026-3876

CVE, Research URL

CVE-2026-3876

Application

Prismatic

Date
Apr 16, 2026
Research Description
The Prismatic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'prismatic_encoded' pseudo-shortcode in all versions up to, and including, 3.7.3. This is due to insufficient input sanitization and output escaping on user-supplied attributes within the 'prismatic_decode' function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page by submitting a comment containing a crafted 'prismatic_encoded' pseudo-shortcode.
Affected versions
max 3.7.4.
Status
vulnerable
Jun 07, 2024

Prismatic # CVE-2021-24408

CVE, Research URL

CVE-2021-24408

Application

Prismatic

Date
Jul 13, 2021
Research Description
The Prismatic WordPress plugin before 2.8 does not sanitise or validate some of its shortcode parameters, allowing users with a role as low as Contributor to set Cross-Site payload in them. A post made by a contributor would still have to be approved by an admin to have the XSS trigger able in the frontend, however, higher privilege users, such as editor could exploit this without the need of approval, and even when the blog disallows the unfiltered_html capability.
Affected versions
max 2.8.
Status
vulnerable

Prismatic # CVE-2021-24409

CVE, Research URL

CVE-2021-24409

Application

Prismatic

Date
Jul 13, 2021
Research Description
The Prismatic WordPress plugin before 2.8 does not escape the 'tab' GET parameter before outputting it back in an attribute, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administrator
Affected versions
max 2.8.
Status
vulnerable