CVE-2021-24408

The Prismatic WordPress plugin before 2.8 does not sanitise or validate some of its shortcode parameters, allowing users with a role as low as Contributor to set Cross-Site payload in them. A post made by a contributor would still have to be approved by an admin to have the XSS trigger able in the frontend, however, higher privilege users, such as editor could exploit this without the need of approval, and even when the blog disallows the unfiltered_html capability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:plugin-planet:prismatic:*:*:*:*:*:wordpress:*:*

History

15 Jul 2021, 14:33

Type Values Removed Values Added
CWE CWE-79
CPE cpe:2.3:a:plugin-planet:prismatic:*:*:*:*:*:wordpress:*:*
References (CONFIRM) https://wpscan.com/vulnerability/51855853-e7bd-425f-802c-824209f4f84d - (CONFIRM) https://wpscan.com/vulnerability/51855853-e7bd-425f-802c-824209f4f84d - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 3.5
v3 : 5.4

12 Jul 2021, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-12 20:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-24408

Mitre link : CVE-2021-24408

CVE.ORG link : CVE-2021-24408


JSON object : View

Products Affected

plugin-planet

  • prismatic
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')