← Retour aux CVEs
CVE-2021-24535
MEDIUM6.1
Description
The Light Messages WordPress plugin through 1.0 is lacking CSRF check when updating it's settings, and is not sanitising its Message Content in them (even with the unfiltered_html disallowed). As a result, an attacker could make a logged in admin update the settings to arbitrary values, and set a Cross-Site Scripting payload in the Message Content. Depending on the options set, the XSS payload can be triggered either in the backend only (in the plugin's settings), or both frontend and backend.
Details CVE
Score CVSS v3.16.1
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie8/16/2021
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
light_messages_project:light_messages
Faiblesses (CWE)
CWE-79CWE-352
References
https://wpscan.com/vulnerability/351de889-9c0a-4637-bd06-0e1fe1d7e89f(contact@wpscan.com)
https://wpscan.com/vulnerability/351de889-9c0a-4637-bd06-0e1fe1d7e89f(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.