mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
79 lines
2.0 KiB
JSON
79 lines
2.0 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2021-24744",
|
|
"ASSIGNER": "contact@wpscan.com",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "WordPress Contact Forms by Cimatti < 1.4.12 - Admin+ Stored Cross-Site Scripting"
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"generator": "WPScan CVE Generator",
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Unknown",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "WordPress Contact Forms by Cimatti",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "1.4.12",
|
|
"version_value": "1.4.12"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The WordPress Contact Forms by Cimatti WordPress plugin before 1.4.12 does not sanitise and escape the Form Title before outputting it in some admin pages. which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed."
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://wpscan.com/vulnerability/702a4283-1fd6-4186-9db7-6ad387d714ea",
|
|
"name": "https://wpscan.com/vulnerability/702a4283-1fd6-4186-9db7-6ad387d714ea"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"value": "CWE-79 Cross-site Scripting (XSS)",
|
|
"lang": "eng"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"credit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Felipe Restrepo Rodriguez"
|
|
},
|
|
{
|
|
"lang": "eng",
|
|
"value": "Sebastian Cruz Cardona"
|
|
}
|
|
],
|
|
"source": {
|
|
"discovery": "EXTERNAL"
|
|
}
|
|
} |