### [CVE-2021-24297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24297) ![](https://img.shields.io/static/v1?label=Product&message=Goto&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen) ### Description The Goto WordPress theme before 2.1 did not properly sanitize the formvalue JSON POST parameter in its tl_filter AJAX action, leading to an unauthenticated Reflected Cross-site Scripting (XSS) vulnerability. ### POC #### Reference - https://wpscan.com/vulnerability/a64a3b2e-7924-47aa-96e8-3aa02a6cdccc #### Github - https://github.com/20142995/nuclei-templates