### [CVE-2021-24556](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24556) ![](https://img.shields.io/static/v1?label=Product&message=Email%20Subscriber&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen) ### Description The kento_email_subscriber_ajax AJAX action of the Email Subscriber WordPress plugin through 1.1, does not properly sanitise, validate and escape the submitted subscribe_email and subscribe_name POST parameters, inserting them in the DB and then outputting them back in the Subscriber list (/wp-admin/edit.php?post_type=kes_campaign&page=kento_email_subscriber_list_settings), leading a Stored XSS issue. ### POC #### Reference - https://codevigilant.com/disclosure/2021/wp-plugin-email-subscriber/ - https://wpscan.com/vulnerability/f050aedc-f79f-4b27-acac-0cdb33b25af8 #### Github - https://github.com/20142995/nuclei-templates