CVE-2021-24822

The Stylish Cost Calculator WordPress plugin before 7.0.4 does not have any authorisation and CSRF checks on some of its AJAX actions (available to authenticated users), which could allow any authenticated users, such as subscriber to call them, and perform Stored Cross-Site Scripting attacks against logged in admin, as well as frontend users due to the lack of sanitisation and escaping in some parameters
Configurations

Configuration 1 (hide)

cpe:2.3:a:stylishcostcalculator:stylish_cost_calculator:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/db84a782-d4c8-4abf-99ea-ea672a9b806e - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/db84a782-d4c8-4abf-99ea-ea672a9b806e - Exploit, Third Party Advisory

Information

Published : 2021-11-29 09:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24822

Mitre link : CVE-2021-24822

CVE.ORG link : CVE-2021-24822


JSON object : View

Products Affected

stylishcostcalculator

  • stylish_cost_calculator
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-352

Cross-Site Request Forgery (CSRF)