Home

Description

WordPress Plugin WP Symposium Pro 2021.10 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts by exploiting insufficient sanitization of the forum name parameter. Attackers can submit POST requests to the admin setup page with JavaScript payloads in the wps_admin_forum_add_name parameter, which are stored and executed when the forum is accessed.

PUBLISHED Reserved 2026-02-01 | Published 2026-05-10 | Updated 2026-05-10 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

2021.10
affected

Credits

Murat DEMIRCI (@butterflyhunt3r) finder

References

www.exploit-db.com/exploits/50514 (ExploitDB-50514) exploit

www.wpsymposiumpro.com/ (Official Product Homepage) product

wordpress.org/plugins/wp-symposium-pro/ (Product Reference) product

www.vulncheck.com/...stored-xss-via-wps-admin-forum-add-name (VulnCheck Advisory: WordPress Plugin WP Symposium Pro 2021.10 Stored XSS via wps_admin_forum_add_name) third-party-advisory

cve.org (CVE-2021-47927)

nvd.nist.gov (CVE-2021-47927)

Download JSON