2021-01-14 16:05:23 +00:00
{
2021-11-29 09:23:33 +01:00
"CVE_data_meta" : {
"ID" : "CVE-2021-24822" ,
"ASSIGNER" : "contact@wpscan.com" ,
"STATE" : "PUBLIC" ,
"TITLE" : "Stylish Cost Calculator < 7.04 - Subscriber+ Unauthorised AJAX Calls to Stored XSS"
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"generator" : "WPScan CVE Generator" ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Unknown" ,
"product" : {
"product_data" : [
{
"product_name" : "Stylish Cost Calculator" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "7.0.4" ,
"version_value" : "7.0.4"
}
]
}
}
]
}
}
]
}
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "The Stylish Cost Calculator WordPress plugin before 7.0.4 does not have any authorisation and CSRF checks on some of its AJAX actions (available to authenticated users), which could allow any authenticated users, such as subscriber to call them, and perform Stored Cross-Site Scripting attacks against logged in admin, as well as frontend users due to the lack of sanitisation and escaping in some parameters"
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"url" : "https://wpscan.com/vulnerability/db84a782-d4c8-4abf-99ea-ea672a9b806e" ,
"name" : "https://wpscan.com/vulnerability/db84a782-d4c8-4abf-99ea-ea672a9b806e"
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
2021-12-07 11:08:12 +01:00
"value" : "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" ,
2021-11-29 09:23:33 +01:00
"lang" : "eng"
}
2021-01-14 16:05:23 +00:00
]
2022-08-01 14:31:50 +02:00
} ,
{
"description" : [
{
"value" : "CWE-352 Cross-Site Request Forgery (CSRF)" ,
"lang" : "eng"
}
]
2021-11-29 09:23:33 +01:00
}
]
} ,
"credit" : [
{
"lang" : "eng" ,
"value" : "apple502j"
2021-01-14 16:05:23 +00:00
}
2021-11-29 09:23:33 +01:00
] ,
"source" : {
"discovery" : "EXTERNAL"
}
}