cvelist/2021/24xxx/CVE-2021-24789.json

75 lines
1.8 KiB
JSON
Raw Normal View History

2021-01-14 16:04:10 +00:00
{
"CVE_data_meta": {
"ID": "CVE-2021-24789",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "Flat Preloader < 1.5.5 - Admin+ Stored Cross-Site Scripting"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Flat Preloader",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.5.5",
"version_value": "1.5.5"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Flat Preloader WordPress plugin before 1.5.5 does not escape some of its settings when outputting them in attribute in the frontend, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/e8550ccd-3898-4e27-aca9-ade89823ff4d",
"name": "https://wpscan.com/vulnerability/e8550ccd-3898-4e27-aca9-ade89823ff4d"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-site Scripting (XSS)",
"lang": "eng"
}
2021-01-14 16:04:10 +00:00
]
}
]
},
"credit": [
{
"lang": "eng",
"value": "apple502j"
2021-01-14 16:04:10 +00:00
}
],
"source": {
"discovery": "EXTERNAL"
}
2021-01-14 16:04:10 +00:00
}