### [CVE-2021-24584](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24584) ![](https://img.shields.io/static/v1?label=Product&message=Timetable%20and%20Event%20Schedule%20by%20MotoPress&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2.4.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen) ### Description The Timetable and Event Schedule WordPress plugin before 2.4.2 does not have proper access control when updating a timeslot, allowing any user with the edit_posts capability (contributor+) to update arbitrary timeslot from any events. Furthermore, no CSRF check is in place as well, allowing such attack to be perform via CSRF against a logged in with such capability. In versions before 2.3.19, the lack of sanitisation and escaping in some of the fields, like the descritption could also lead to Stored XSS issues ### POC #### Reference - https://wpscan.com/vulnerability/60eadf75-8298-49de-877e-ce103fc34d58 #### Github - https://github.com/20142995/nuclei-templates