← Back to CVEs
CVE-2021-24535
MEDIUM6.1
Description
The Light Messages WordPress plugin through 1.0 is lacking CSRF check when updating it's settings, and is not sanitising its Message Content in them (even with the unfiltered_html disallowed). As a result, an attacker could make a logged in admin update the settings to arbitrary values, and set a Cross-Site Scripting payload in the Message Content. Depending on the options set, the XSS payload can be triggered either in the backend only (in the plugin's settings), or both frontend and backend.
CVE Details
CVSS v3.1 Score6.1
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published8/16/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
light_messages_project:light_messages
Weaknesses (CWE)
CWE-79CWE-352
References
https://wpscan.com/vulnerability/351de889-9c0a-4637-bd06-0e1fe1d7e89f(contact@wpscan.com)
https://wpscan.com/vulnerability/351de889-9c0a-4637-bd06-0e1fe1d7e89f(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.