mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
18 lines
1.0 KiB
Markdown
18 lines
1.0 KiB
Markdown
|
|
### [CVE-2021-24369](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24369)
|
||
|
|

|
||
|
|

|
||
|
|
&color=brighgreen)
|
||
|
|
|
||
|
|
### Description
|
||
|
|
|
||
|
|
In the GetPaid WordPress plugin before 2.3.4, users with the contributor role and above can create a new Payment Form, however the Label and Help Text input fields were not getting sanitized properly. So it was possible to inject malicious content such as img tags, leading to a Stored Cross-Site Scripting issue which is triggered when the form will be edited, for example when an admin reviews it and could lead to privilege escalation.
|
||
|
|
|
||
|
|
### POC
|
||
|
|
|
||
|
|
#### Reference
|
||
|
|
- https://wpscan.com/vulnerability/1d1a731b-78f7-4d97-b40d-80f66700edae
|
||
|
|
|
||
|
|
#### Github
|
||
|
|
No PoCs found on GitHub currently.
|
||
|
|
|