๐Ÿ” CVE Alert

CVE-2020-36854

MEDIUM 6.4

Async JavaScript <= 2.19.07.14 - Authenticated (Subscriber+) Stored Cross-Site Scripting

CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th

The Async JavaScript plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.19.07.14. This is due to missing authorization checks on the aj_steps AJAX aciton along with a lack on sanitization on the settings saved via the function. This makes it possible for authenticated attackers with subscriber level permissions and above to inject malicious web scripts into a page that execute whenever a user accesses that page.

CWE CWE-79
Vendor cloughit
Product async javascript
Published Oct 18, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for cloughit async javascript

Be the first to know when new medium vulnerabilities affecting cloughit async javascript are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

cloughit / Async JavaScript
0 < 2.20.02.27

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/b133888c-7673-4796-917c-486bff1b6b12?source=cve wordfence.com: https://www.wordfence.com/blog/2020/02/site-takeover-campaign-exploits-multiple-zero-day-vulnerabilities/

Credits

Mikey Veenstra