### [CVE-2021-24214](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24214) ![](https://img.shields.io/static/v1?label=Product&message=OpenID%20Connect%20Generic%20Client&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.8.0%3E%3D%203.8.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen) ### Description The OpenID Connect Generic Client WordPress plugin 3.8.0 and 3.8.1 did not sanitise the login error when output back in the login form, leading to a reflected Cross-Site Scripting issue. This issue does not require authentication and can be exploited with the default configuration. ### POC #### Reference - https://wpscan.com/vulnerability/31cf0dfb-4025-4898-a5f4-fc7115565a10 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates