cve/2021/CVE-2021-24450.md

18 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-24450](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24450)
![](https://img.shields.io/static/v1?label=Product&message=User%20Registration%2C%20User%20Profiles%2C%20Login%20%26%20Membership%20%E2%80%93%20ProfilePress%20(Formerly%20WP%20User%20Avatar)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.1.8%3C%203.1.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
The User Registration, User Profiles, Login & Membership ProfilePress (Formerly WP User Avatar) WordPress plugin before 3.1.8 did not sanitise or escape some of its settings before saving them and outputting them back in the page, allowing high privilege users such as admin to set JavaScript payloads in them even when the unfiltered_html capability is disallowed, leading to an authenticated Stored Cross-Site Scripting issue
### POC
#### Reference
- https://wpscan.com/vulnerability/a8625579-fe8f-4bc1-a641-0e26ad141c92
#### Github
No PoCs found on GitHub currently.