CVE-2021-33347

An issue was discovered in JPress v3.3.0 and below. There are XSS vulnerabilities in the template module and tag management module. If you log in to the background by means of weak password, the storage XSS vulnerability can occur.
References
Link Resource
https://github.com/JPressProjects/jpress/issues/152 Exploit Issue Tracking Third Party Advisory
https://github.com/JPressProjects/jpress/issues/152#issuecomment-850119847 Exploit Issue Tracking Third Party Advisory
https://github.com/JPressProjects/jpress/issues/152 Exploit Issue Tracking Third Party Advisory
https://github.com/JPressProjects/jpress/issues/152#issuecomment-850119847 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jpress:jpress:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:08

Type Values Removed Values Added
References () https://github.com/JPressProjects/jpress/issues/152 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/JPressProjects/jpress/issues/152 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/JPressProjects/jpress/issues/152#issuecomment-850119847 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/JPressProjects/jpress/issues/152#issuecomment-850119847 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2021-06-18 11:15

Updated : 2024-11-21 06:08


NVD link : CVE-2021-33347

Mitre link : CVE-2021-33347

CVE.ORG link : CVE-2021-33347


JSON object : View

Products Affected

jpress

  • jpress
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')