The GiveWP – Donation Plugin and Fundraising Platform WordPress plugin before 2.10.4 did not sanitise or escape the Background Image field of its Stripe Checkout Setting and Logo field in its Email settings, leading to authenticated (admin+) Stored XSS issues.
References
Link | Resource |
---|---|
https://m0ze.ru/vulnerability/%5B2021-04-02%5D-%5BWordPress%5D-%5BCWE-79%5D-GiveWP-WordPress-Plugin-v2.10.3.txt | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/006b37c9-641c-4676-a315-9b6053e001d2 | Exploit Third Party Advisory |
Configurations
History
24 May 2021, 18:48
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
CPE | cpe:2.3:a:givewp:give:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 4.8 |
References | (MISC) https://m0ze.ru/vulnerability/%5B2021-04-02%5D-%5BWordPress%5D-%5BCWE-79%5D-GiveWP-WordPress-Plugin-v2.10.3.txt - Exploit, Third Party Advisory | |
References | (CONFIRM) https://wpscan.com/vulnerability/006b37c9-641c-4676-a315-9b6053e001d2 - Exploit, Third Party Advisory |
Information
Published : 2021-05-17 17:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-24315
Mitre link : CVE-2021-24315
CVE.ORG link : CVE-2021-24315
JSON object : View
Products Affected
givewp
- givewp
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')