The Recipe Card Blocks by WPZOOM WordPress plugin before 2.8.3 does not properly sanitise or escape some of the properties of the Recipe Card Block (such as ingredientsLayout, iconSet, steps, ingredients, recipeTitle, or settings), which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/a49c5a5b-57c0-4801-8bf1-cd3a05b12288 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/a49c5a5b-57c0-4801-8bf1-cd3a05b12288 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/a49c5a5b-57c0-4801-8bf1-cd3a05b12288 - Exploit, Third Party Advisory |
Information
Published : 2021-09-27 16:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24634
Mitre link : CVE-2021-24634
CVE.ORG link : CVE-2021-24634
JSON object : View
Products Affected
wpzoom
- recipe_card_blocks_for_gutenberg_\&_elementor
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')