### [CVE-2021-24563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24563) ![](https://img.shields.io/static/v1?label=Product&message=Frontend%20Uploader&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.3.2%3C%3D%201.3.2%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen) ### Description The Frontend Uploader WordPress plugin through 1.3.2 does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly ### POC #### Reference - http://packetstormsecurity.com/files/165515/WordPress-Frontend-Uploader-1.3.2-Cross-Site-Scripting.html - https://wpscan.com/vulnerability/e53ef41e-a176-4d00-916a-3a03835370f1 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/V35HR4J/CVE-2021-24563 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/whoforget/CVE-POC - https://github.com/youwizard/CVE-POC