The pspin_duplicate_post_save_as_new_post function of the Project Status WordPress plugin through 1.6 does not sanitise, validate or escape the post GET parameter passed to it before outputting it in an error message when the related post does not exist, leading to a reflected XSS issue
References
Link | Resource |
---|---|
https://codevigilant.com/disclosure/2021/wp-plugin-project-status/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/ca5f2152-fcfd-492d-a552-f9604011beff | Exploit Third Party Advisory |
Configurations
History
27 Aug 2021, 17:24
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 5.4 |
CPE | cpe:2.3:a:3.7designs:project_status:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://wpscan.com/vulnerability/ca5f2152-fcfd-492d-a552-f9604011beff - Exploit, Third Party Advisory | |
References | (MISC) https://codevigilant.com/disclosure/2021/wp-plugin-project-status/ - Exploit, Third Party Advisory |
23 Aug 2021, 12:23
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-08-23 12:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-24558
Mitre link : CVE-2021-24558
CVE.ORG link : CVE-2021-24558
JSON object : View
Products Affected
3.7designs
- project_status
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')