cve/2021/CVE-2021-24450.md
2024-06-18 02:51:15 +02:00

18 lines
1.1 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2021-24450](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24450)
![](https://img.shields.io/static/v1?label=Product&message=User%20Registration%2C%20User%20Profiles%2C%20Login%20%26%20Membership%20%E2%80%93%20ProfilePress%20(Formerly%20WP%20User%20Avatar)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.1.8%3C%203.1.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
The User Registration, User Profiles, Login & Membership ProfilePress (Formerly WP User Avatar) WordPress plugin before 3.1.8 did not sanitise or escape some of its settings before saving them and outputting them back in the page, allowing high privilege users such as admin to set JavaScript payloads in them even when the unfiltered_html capability is disallowed, leading to an authenticated Stored Cross-Site Scripting issue
### POC
#### Reference
- https://wpscan.com/vulnerability/a8625579-fe8f-4bc1-a641-0e26ad141c92
#### Github
No PoCs found on GitHub currently.