cve/2021/CVE-2021-24424.md

18 lines
854 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-24424](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24424)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Reset%20%E2%80%93%20Most%20Advanced%20WordPress%20Reset%20Tool&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=1.90%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen)
2024-05-25 21:48:12 +02:00
### Description
The WP Reset Most Advanced WordPress Reset Tool WordPress plugin before 1.90 did not sanitise or escape its extra_data parameter when creating a snapshot via the admin dashboard, leading to an authenticated Stored Cross-Site Scripting issue
### POC
#### Reference
- https://wpscan.com/vulnerability/90cf8f9d-4d37-405d-b161-239bdb281828
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
2024-05-25 21:48:12 +02:00