The Per page add to head WordPress plugin before 1.4.4 is lacking any CSRF check when saving its settings, which could allow attackers to make a logged in admin change them. Furthermore, as the plugin allows arbitrary HTML to be inserted in one of the setting (feature mentioned by the plugin), this could lead to Stored XSS issue which will be triggered either in the backend, frontend or both depending on the payload used.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/e9885fba-0e73-41a0-9e1d-47badc09be85 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-09-13 18:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-24586
Mitre link : CVE-2021-24586
CVE.ORG link : CVE-2021-24586
JSON object : View
Products Affected
evona
- per_page_add_to_head