### [CVE-2021-24581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24581) ![](https://img.shields.io/static/v1?label=Product&message=Blue%20Admin&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=21.06.01%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen) ### Description The Blue Admin WordPress plugin through 21.06.01 does not sanitise or escape its "Logo Title" setting before outputting in a page, leading to a Stored Cross-Site Scripting issue. Furthermore, the plugin does not have CSRF check in place when saving its settings, allowing the issue to be exploited via a CSRF attack. ### POC #### Reference - https://wpscan.com/vulnerability/75abd073-b45f-4fe6-8501-7a6d0163f78d #### Github - https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/cvemon