The St-Daily-Tip WordPress plugin through 4.7 does not have any CSRF check in place when saving its 'Default Text to Display if no tips' setting, and was also lacking sanitisation as well as escaping before outputting it the page. This could allow attacker to make logged in administrators set a malicious payload in it, leading to a Stored Cross-Site Scripting issue
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/def352f8-1bbe-4263-ad1a-1486140269f4 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-10-25 14:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-24487
Mitre link : CVE-2021-24487
CVE.ORG link : CVE-2021-24487
JSON object : View
Products Affected
sanskruti
- st-daily-tip