The Keyword Meta WordPress plugin through 3.0 does not sanitise of escape its settings before outputting them back in the page after they are saved, allowing for Cross-Site Scripting issues. Furthermore, it is also lacking any CSRF check, allowing attacker to make a logged in high privilege user save arbitrary setting via a CSRF attack.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/b4a2e595-6971-4a2a-a346-ac4445a5e0cd | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/b4a2e595-6971-4a2a-a346-ac4445a5e0cd | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/b4a2e595-6971-4a2a-a346-ac4445a5e0cd - Exploit, Third Party Advisory |
Information
Published : 2021-09-06 11:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24611
Mitre link : CVE-2021-24611
CVE.ORG link : CVE-2021-24611
JSON object : View
Products Affected
keyword_meta_project
- keyword_meta