cve/2021/CVE-2021-24950.md
2025-09-29 21:09:30 +02:00

18 lines
1000 B
Markdown

### [CVE-2021-24950](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24950)
![](https://img.shields.io/static/v1?label=Product&message=Insight%20Core&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brightgreen)
### Description
The Insight Core WordPress plugin through 1.0 does not have any authorisation and CSRF checks in the insight_customizer_options_import (available to any authenticated user), does not validate user input before passing it to unserialize(), nor sanitise and escape it before outputting it in the response. As a result, it could allow users with a role as low as Subscriber to perform PHP Object Injection, as well as Stored Cross-Site Scripting attacks
### POC
#### Reference
- https://wpscan.com/vulnerability/01d430ea-ef85-4529-9ae4-c1f70016bb75
#### Github
- https://github.com/20142995/nuclei-templates