ID |
CVE-2021-24693
|
Sažetak |
The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the "File Thumbnail" post meta before outputting it in some pages, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks. Given the that XSS is triggered even when the Download is in a review state, contributor could make JavaScript code execute in a context of a reviewer such as admin and make them create a rogue admin account, or install a malicious plugin |
Reference |
|
CVSS |
Base: | 6.0 |
Impact: | 6.4 |
Exploitability: | 6.8 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
MEDIUM |
SINGLE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
PARTIAL |
PARTIAL |
PARTIAL |
|
CVSS vektor |
AV:N/AC:M/Au:S/C:P/I:P/A:P |
Zadnje važnije ažuriranje |
10-11-2021 - 20:25 |
Objavljeno |
08-11-2021 - 18:15 |