CVE-2021-24509

The Page View Count WordPress plugin before 2.4.9 does not escape the postid parameter of pvc_stats shortcode, allowing users with a role as low as Contributor to perform Stored XSS attacks. A post made by a contributor would still have to be approved by an admin to have the XSS triggered in the frontend, however, higher privilege users, such as editor could exploit this without the need of approval, and even when the blog disallows the unfiltered_html capability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:a3rev:page_view_count:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/06df2729-21da-4c22-ae1e-dda1f15bdf8f - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/06df2729-21da-4c22-ae1e-dda1f15bdf8f - Exploit, Third Party Advisory

Information

Published : 2021-08-09 10:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24509

Mitre link : CVE-2021-24509

CVE.ORG link : CVE-2021-24509


JSON object : View

Products Affected

a3rev

  • page_view_count
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')