CVE-2021-24408

The Prismatic WordPress plugin before 2.8 does not sanitise or validate some of its shortcode parameters, allowing users with a role as low as Contributor to set Cross-Site payload in them. A post made by a contributor would still have to be approved by an admin to have the XSS trigger able in the frontend, however, higher privilege users, such as editor could exploit this without the need of approval, and even when the blog disallows the unfiltered_html capability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:plugin-planet:prismatic:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/51855853-e7bd-425f-802c-824209f4f84d - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/51855853-e7bd-425f-802c-824209f4f84d - Exploit, Third Party Advisory

Information

Published : 2021-07-12 20:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24408

Mitre link : CVE-2021-24408

CVE.ORG link : CVE-2021-24408


JSON object : View

Products Affected

plugin-planet

  • prismatic
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')