Description
WordPress Plugin Realteo is prone to multiple vulnerabilities, including cross-site scripting and security bypass vulnerabilities. Exploiting these issues may allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials, or to perform otherwise restricted actions and subsequently delete arbitrary properties. WordPress Plugin Realteo version 1.2.3 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.2.4 or latest
References
https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Realteo-WordPress-Plugin-v1.2.3.txt
https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Realteo-WordPress-Plugin-v1.2.3.txt
https://sploitus.com/exploit?id=WPEX-ID:B8434EB2-F522-484F-9227-5F581E7F48A5
https://sploitus.com/exploit?id=WPEX-ID:087B27C4-289E-410F-AF74-828A608A4E1E
https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/