Description
WordPress Plugin Trashbin is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Remediation
Edit the source code to ensure that input is properly sanitised or disable the plugin until a fix is available
References
Related Vulnerabilities
MySQL CVE-2021-35537 Vulnerability (CVE-2021-35537)
WordPress Plugin Responsive Lightbox2 Cross-Site Scripting (1.0.2)
WordPress Plugin PowerPack Lite for Beaver Builder Cross-Site Scripting (1.2.9.2)
WordPress Plugin RBX Gallery 'uploader.php' Arbitrary File Upload (2.1)
WordPress Plugin Automated Content for Real Estate Multiple Unspecified Vulnerabilities (5.4.2)