The WP Offload SES Lite WordPress plugin before 1.4.5 did not escape some of the fields in the Activity page of the admin dashboard, such as the email's id, subject and recipient, which could lead to Stored Cross-Site Scripting issues when an attacker can control any of these fields, like the subject when filling a contact form for example. The XSS will be executed in the context of a logged in admin viewing the Activity tab of the plugin.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/8f14733e-84c3-4f7c-93f8-e27c74519160 | Exploit Vendor Advisory |
https://wpscan.com/vulnerability/8f14733e-84c3-4f7c-93f8-e27c74519160 | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/8f14733e-84c3-4f7c-93f8-e27c74519160 - Exploit, Vendor Advisory |
Information
Published : 2021-07-06 11:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24494
Mitre link : CVE-2021-24494
CVE.ORG link : CVE-2021-24494
JSON object : View
Products Affected
deliciousbrains
- wp_offload_ses_lite
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')