{ "id": "CVE-2021-24936", "sourceIdentifier": "contact@wpscan.com", "published": "2022-01-24T08:15:08.850", "lastModified": "2022-01-27T16:49:12.450", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The WP Extra File Types WordPress plugin before 0.5.1 does not have CSRF check when saving its settings, nor sanitise and escape some of them, which could allow attackers to make a logged in admin change them and perform Cross-Site Scripting attacks" }, { "lang": "es", "value": "El plugin WP Extra File Types de WordPress versiones anteriores a 0.5.1, no presenta comprobaci\u00f3n de CSRF cuando guarda sus configuraciones, no sanea y escapa de algunas de ellas, lo que podr\u00eda permitir a atacantes hacer que un administrador conectado las cambie y llevar a cabo ataques de tipo Cross-Site Scripting" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.1, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "contact@wpscan.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-352" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:wp_extra_file_types_project:wp_extra_file_types:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "0.5.1", "matchCriteriaId": "A7DFB7C3-222F-48A8-B62C-81281D5ED741" } ] } ] } ], "references": [ { "url": "https://wpscan.com/vulnerability/4fb61b84-ff5f-4b4c-a516-54b749f9611e", "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ] } ] }