The Stop Spammers WordPress plugin before 2021.9 did not escape user input when blocking requests (such as matching a spam word), outputting it in an attribute after sanitising it to remove HTML tags, which is not sufficient and lead to a reflected Cross-Site Scripting issue.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/5e7accd6-08dc-4c6e-9d19-73e2d7e97735 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/162623/WordPress-Stop-Spammers-2021.8-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2021-05-06 06:15
Updated : 2021-05-26 12:35
NVD link : CVE-2021-24245
Mitre link : CVE-2021-24245
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
trumani
- stop_spammers