The Glass WordPress plugin through 1.3.2 does not sanitise or escape its "Glass Pages" setting before outputting in a page, leading to a Stored Cross-Site Scripting issue. Furthermore, the plugin did not have CSRF check in place when saving its settings, allowing the issue to be exploited via a CSRF attack.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/dbea2dc2-83f6-4e70-b044-a68a4c9b9c39 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/dbea2dc2-83f6-4e70-b044-a68a4c9b9c39 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/dbea2dc2-83f6-4e70-b044-a68a4c9b9c39 - Exploit, Third Party Advisory |
Information
Published : 2021-07-12 20:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24434
Mitre link : CVE-2021-24434
CVE.ORG link : CVE-2021-24434
JSON object : View
Products Affected
codeblab
- glass