PatchSiren

PatchSiren cyber security CVE debrief

CVE-2021-47924 Wordpress CVE debrief

CVE-2021-47924 describes a stored cross-site scripting issue in Ultimate Product Catalog 5.8.2. According to the supplied record, an authenticated attacker can submit a malicious value through the price parameter and have it execute when the affected product is viewed. The CVE entry was published and modified on 2026-05-10 in the supplied timeline.

Vendor
Wordpress
Product
Unknown
CVSS
MEDIUM 5.1
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-10
Original CVE updated
2026-05-10
Advisory published
2026-05-10
Advisory updated
2026-05-10

Who should care

WordPress site owners and administrators running the Ultimate Product Catalog plugin, especially sites where authenticated users can add or edit catalog entries. Security teams should pay attention if product data is user-generated or if multiple roles can manage catalog content.

Technical summary

The supplied NVD-based record identifies CWE-79 and describes a stored XSS condition in Ultimate Product Catalog 5.8.2. The issue is triggered through POST submissions to post.php, where the price field can carry HTML or JavaScript that is later rendered in a product view. The vulnerability requires authentication and user interaction, which is reflected in the CVSS vector.

Defensive priority

Medium. Remediate promptly if the plugin is installed and authenticated users can create or edit products, because stored XSS can impact any viewer of the poisoned entry.

Recommended defensive actions

  • Inventory WordPress installations to confirm whether Ultimate Product Catalog is present and which version is deployed.
  • Update or replace the plugin if a fixed version is available from the vendor or WordPress plugin repository.
  • Restrict who can create or edit catalog items, especially roles allowed to submit product prices.
  • Review product data validation and output encoding for fields that are rendered back into HTML.
  • Inspect existing catalog entries for unexpected markup or script content in the price field.
  • Apply web application monitoring or WAF rules to detect suspicious POST submissions to post.php and repeated attempts to inject script payloads.

Evidence notes

The supplied source corpus includes an NVD record marked 'Received' with CWE-79 and a CVSS v4 vector indicating network access, low attack complexity, low privileges, and user interaction. The record’s references point to the WordPress plugin page, the vendor site, and a VulnCheck advisory. No exploit details are used beyond the description provided in the source record.

Official resources

Publicly recorded in NVD on 2026-05-10 with source references to the WordPress plugin page, the vendor site, and a VulnCheck advisory.