CVE-2021-24558

The pspin_duplicate_post_save_as_new_post function of the Project Status WordPress plugin through 1.6 does not sanitise, validate or escape the post GET parameter passed to it before outputting it in an error message when the related post does not exist, leading to a reflected XSS issue
Configurations

Configuration 1 (hide)

cpe:2.3:a:3.7designs:project_status:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://codevigilant.com/disclosure/2021/wp-plugin-project-status/ - Exploit, Third Party Advisory () https://codevigilant.com/disclosure/2021/wp-plugin-project-status/ - Exploit, Third Party Advisory
References () https://wpscan.com/vulnerability/ca5f2152-fcfd-492d-a552-f9604011beff - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/ca5f2152-fcfd-492d-a552-f9604011beff - Exploit, Third Party Advisory

Information

Published : 2021-08-23 12:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24558

Mitre link : CVE-2021-24558

CVE.ORG link : CVE-2021-24558


JSON object : View

Products Affected

3.7designs

  • project_status
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')