The Wp Cookie Choice WordPress plugin through 1.1.0 is lacking any CSRF check when saving its options, and do not escape them when outputting them in attributes. As a result, an attacker could make a logged in admin change them to arbitrary values including XSS payloads via a CSRF attack.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/c809bdb3-d820-4ce1-9cbc-e41985fb5052 | Third Party Advisory |
https://wpscan.com/vulnerability/c809bdb3-d820-4ce1-9cbc-e41985fb5052 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/c809bdb3-d820-4ce1-9cbc-e41985fb5052 - Third Party Advisory |
Information
Published : 2021-10-18 14:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24595
Mitre link : CVE-2021-24595
CVE.ORG link : CVE-2021-24595
JSON object : View
Products Affected
wp_cookie_choice_project
- wp_cookie_choice