2024-01-16 17:00:28 +00:00
{
"id" : "CVE-2021-24567" ,
"sourceIdentifier" : "contact@wpscan.com" ,
"published" : "2024-01-16T16:15:09.050" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T05:53:19.167" ,
2024-08-29 22:03:16 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-01-16 17:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Simple Post WordPress plugin through 1.1 does not sanitize user input when an authenticated user Text value, then it does not escape these values when outputting to the browser leading to an Authenticated Stored XSS Cross-Site Scripting issue."
2024-01-19 17:00:29 +00:00
} ,
{
"lang" : "es" ,
"value" : "El complemento Simple Post WordPress hasta la versi\u00f3n 1.1 no sanitiza la entrada del usuario cuando un valor de texto de usuario autenticado, luego no escapa de estos valores cuando se env\u00eda al navegador, lo que genera un problema de cross site scripting (XSS) almacenado autenticado."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.4 ,
"baseSeverity" : "MEDIUM" ,
2024-01-19 17:00:29 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-08-29 22:03:16 +00:00
} ,
"exploitabilityScore" : 2.3 ,
"impactScore" : 2.7
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.4 ,
"baseSeverity" : "MEDIUM" ,
2024-08-29 22:03:16 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-01-19 17:00:29 +00:00
} ,
"exploitabilityScore" : 2.3 ,
"impactScore" : 2.7
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:nickmomrik:simple_post:*:*:*:*:*:wordpress:*:*" ,
"versionEndIncluding" : "1.1" ,
"matchCriteriaId" : "303EC6DD-DD3A-4E54-AF9F-586A11905F54"
}
]
}
]
2024-01-16 17:00:28 +00:00
}
] ,
"references" : [
{
"url" : "https://wpscan.com/vulnerability/a3cd3115-2181-4e14-8b39-4de096433847/" ,
2024-01-19 17:00:29 +00:00
"source" : "contact@wpscan.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://wpscan.com/vulnerability/a3cd3115-2181-4e14-8b39-4de096433847/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-01-16 17:00:28 +00:00
}
]
}