CVE-2021-24626

The Chameleon CSS WordPress plugin through 1.2 does not have any CSRF and capability checks in all its AJAX calls, allowing any authenticated user, such as subscriber to call them and perform unauthorised actions. One of AJAX call, remove_css, also does not sanitise or escape the css_id POST parameter before using it in a SQL statement, leading to a SQL Injection
Configurations

Configuration 1 (hide)

cpe:2.3:a:chameleon_css_project:chameleon_css:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://codevigilant.com/disclosure/2021/wp-plugin-chameleon-css/ - Exploit, Third Party Advisory () https://codevigilant.com/disclosure/2021/wp-plugin-chameleon-css/ - Exploit, Third Party Advisory
References () https://wpscan.com/vulnerability/06cb6c14-99b8-45b6-be2e-f4dcca8a4165 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/06cb6c14-99b8-45b6-be2e-f4dcca8a4165 - Exploit, Third Party Advisory

Information

Published : 2021-11-08 18:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24626

Mitre link : CVE-2021-24626

CVE.ORG link : CVE-2021-24626


JSON object : View

Products Affected

chameleon_css_project

  • chameleon_css
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CWE-352

Cross-Site Request Forgery (CSRF)