cve/2021/CVE-2021-4227.md

18 lines
852 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-4227](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4227)
![](https://img.shields.io/static/v1?label=Product&message=ark-commenteditor&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)&color=brighgreen)
### Description
The ark-commenteditor WordPress plugin through 2.15.6 does not properly sanitise or encode the comments when in Source editor, allowing attackers to inject an iFrame in the page and thus load arbitrary content from any page to the comment section
### POC
#### Reference
- https://wpscan.com/vulnerability/8d015eba-31dc-44cb-a051-4e95df782b75/
#### Github
No PoCs found on GitHub currently.