The YOP Poll WordPress plugin before 6.3.1 is affected by a stored Cross-Site Scripting vulnerability which exists in the Create Poll - Options module where a user with a role as low as author is allowed to execute arbitrary script code within the context of the application. This vulnerability is due to insufficient validation of custom label parameters - vote button label , results link label and back to vote caption label.
References
Link | Resource |
---|---|
https://www.fortiguard.com/zeroday/FG-VD-21-053 | Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2605368 | Patch Third Party Advisory |
https://wpscan.com/vulnerability/72f58b14-e5cb-4f1c-a16f-621238c6ebbf | Third Party Advisory |
Configurations
Information
Published : 2021-11-17 03:15
Updated : 2021-11-18 12:40
NVD link : CVE-2021-24834
Mitre link : CVE-2021-24834
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
yop-poll
- yop_poll