The WP RSS Aggregator WordPress plugin before 4.19.3 does not sanitise and escape data before outputting it in the System Info admin dashboard, which could lead to a Stored XSS issue due to the wprss_dismiss_addon_notice AJAX action missing authorisation and CSRF checks, allowing any authenticated users, such as subscriber to call it and set a malicious payload in the addon parameter.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/0742483b-6314-451b-a63a-536fd1e14845 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/0742483b-6314-451b-a63a-536fd1e14845 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/0742483b-6314-451b-a63a-536fd1e14845 - Exploit, Third Party Advisory |
Information
Published : 2021-12-27 11:15
Updated : 2024-11-21 05:54
NVD link : CVE-2021-24988
Mitre link : CVE-2021-24988
CVE.ORG link : CVE-2021-24988
JSON object : View
Products Affected
wprssaggregator
- wp_rss_aggregator