### [CVE-2021-24147](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24147) ![](https://img.shields.io/static/v1?label=Product&message=Modern%20Events%20Calendar%20Lite&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.16.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen) ### Description Unvalidated input and lack of output encoding in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not sanitise the mic_comment field (Notes on time) when adding/editing an event, allowing users with privilege as low as author to add events with a Cross-Site Scripting payload in them, which will be triggered in the frontend when viewing the event. ### POC #### Reference - https://wpscan.com/vulnerability/0f9ba284-5d7e-4092-8344-c68316b0146f #### Github - https://github.com/20142995/nuclei-templates - https://github.com/Artisan-Lab/Rust-memory-safety-bugs