### [CVE-2021-25026](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25026) ![](https://img.shields.io/static/v1?label=Product&message=Patreon%20WordPress&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.8.2%3C%201.8.2%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen) ### Description The Patreon WordPress plugin before 1.8.2 does not sanitise and escape the field "Custom Patreon Page name", which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed ### POC #### Reference - https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe #### Github No PoCs found on GitHub currently.