The Async JavaScript plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.19.07.14. This is due to missing authorization checks on the aj_steps AJAX aciton along with a lack on sanitization on the settings saved via the function. This makes it possible for authenticated attackers with subscriber level permissions and above to inject malicious web scripts into a page that execute whenever a user accesses that page.
Metrics
Affected Vendors & Products
References
History
Sat, 18 Oct 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Async JavaScript plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.19.07.14. This is due to missing authorization checks on the aj_steps AJAX aciton along with a lack on sanitization on the settings saved via the function. This makes it possible for authenticated attackers with subscriber level permissions and above to inject malicious web scripts into a page that execute whenever a user accesses that page. | |
Title | Async JavaScript <= 2.19.07.14 - Authenticated (Subscriber+) Stored Cross-Site Scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-10-18T03:33:24.573Z
Reserved: 2025-10-17T15:05:50.130Z
Link: CVE-2020-36854

No data.

Status : Received
Published: 2025-10-18T04:16:04.037
Modified: 2025-10-18T04:16:04.037
Link: CVE-2020-36854

No data.

No data.