cve/2021/CVE-2021-24804.md

18 lines
940 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-24804](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24804)
![](https://img.shields.io/static/v1?label=Product&message=Simple%20JWT%20Login%20%E2%80%93%20Login%20and%20Register%20to%20WordPress%20using%20JWT&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.2.1%3C%203.2.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
The Simple JWT Login WordPress plugin before 3.2.1 does not have nonce checks when saving its settings, allowing attackers to make a logged in admin changed them. Settings such as HMAC verification secret, account registering and default user roles can be updated, which could result in site takeover.
### POC
#### Reference
- https://wpscan.com/vulnerability/6f015e8e-462b-4ef7-a9a1-bb91e7d28e37
#### Github
No PoCs found on GitHub currently.