The GiveWP – Donation Plugin and Fundraising Platform WordPress plugin before 2.10.4 did not sanitise or escape the Background Image field of its Stripe Checkout Setting and Logo field in its Email settings, leading to authenticated (admin+) Stored XSS issues.
References
Link | Resource |
---|---|
https://m0ze.ru/vulnerability/%5B2021-04-02%5D-%5BWordPress%5D-%5BCWE-79%5D-GiveWP-WordPress-Plugin-v2.10.3.txt | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/006b37c9-641c-4676-a315-9b6053e001d2 | Exploit Third Party Advisory |
Configurations
History
07 Nov 2023, 03:31
Type | Values Removed | Values Added |
---|---|---|
Summary | The GiveWP – Donation Plugin and Fundraising Platform WordPress plugin before 2.10.4 did not sanitise or escape the Background Image field of its Stripe Checkout Setting and Logo field in its Email settings, leading to authenticated (admin+) Stored XSS issues. |
Information
Published : 2021-05-17 17:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-24315
Mitre link : CVE-2021-24315
CVE.ORG link : CVE-2021-24315
JSON object : View
Products Affected
givewp
- givewp
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')