Descrição
The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the “File Thumbnail” post meta before outputting it in some pages, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks. Given the that XSS is triggered even when the Download is in a review state, contributor could make JavaScript code execute in a context of a reviewer such as admin and make them create a rogue admin account, or install a malicious plugin
Software
Não informado
Tipo Software
Plugin
CVE
CVE-2021-24693
Tags
Nâo informado
Data de publicação
08/11/2021
Última atualização
08/12/2024
Pontuação em CVSS 3.0
9
Crítico