The Pixel Cat WordPress plugin before 2.6.2 does not have CSRF check when saving its settings, and did not sanitise as well as escape some of them, which could allow attacker to make a logged in admin change them and perform Cross-Site Scripting attacks
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/399ffd65-f3c0-4fbe-a83a-2a620976aad2 | Exploit Third Party Advisory |
Configurations
History
15 Dec 2021, 19:17
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.0
v3 : 9.0 |
References | (MISC) https://wpscan.com/vulnerability/399ffd65-f3c0-4fbe-a83a-2a620976aad2 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:fatcatapps:pixel_cat:*:*:*:*:*:wordpress:*:* |
13 Dec 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-13 11:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-24922
Mitre link : CVE-2021-24922
CVE.ORG link : CVE-2021-24922
JSON object : View
Products Affected
fatcatapps
- pixel_cat
CWE
CWE-352
Cross-Site Request Forgery (CSRF)