The User Registration WordPress plugin before 2.0.2 does not properly sanitise the user_registration_profile_pic_url value when submitted directly via the user_registration_update_profile_details AJAX action. This could allow any authenticated user, such as subscriber, to perform Stored Cross-Site attacks when their profile is viewed
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/5c7a9473-d32e-47d6-9f8e-15b96fe758f2 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/5c7a9473-d32e-47d6-9f8e-15b96fe758f2 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/5c7a9473-d32e-47d6-9f8e-15b96fe758f2 - Exploit, Third Party Advisory |
Information
Published : 2021-10-04 12:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24654
Mitre link : CVE-2021-24654
CVE.ORG link : CVE-2021-24654
JSON object : View
Products Affected
wpeverest
- user_registration
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')