### [CVE-2021-24243](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24243) ![](https://img.shields.io/static/v1?label=Product&message=WPBakery%20Page%20Builder%20(Visual%20Composer)%20Clipboard&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=4.5.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.5.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen) ### Description An AJAX action registered by the WPBakery Page Builder (Visual Composer) Clipboard WordPress plugin before 4.5.6 did not have capability checks nor sanitization, allowing low privilege users (subscriber+) to call it and set XSS payloads, which will be triggered in all backend pages. ### POC #### Reference - https://wpscan.com/vulnerability/3bc0733a-b949-40c9-a5fb-f56814fc4af3 #### Github - https://github.com/20142995/nuclei-templates