CVE-2021-24313 (GCVE-0-2021-24313)
Vulnerability from cvelistv5 – Published: 2021-06-01 11:33 – Updated: 2024-08-03 19:28
VLAI?
Title
WP Prayer < 1.6.2 - Authenticated Stored Cross-Site Scripting (XSS)
Summary
The WP Prayer WordPress plugin before 1.6.2 provides the functionality to store requested prayers/praises and list them on a WordPress website. These stored prayer/praise requests can be listed by using the WP Prayer engine. An authenticated WordPress user with any role can fill in the form to request a prayer. The form to request prayers or praises have several fields. The 'prayer request' and 'praise request' fields do not use proper input validation and can be used to store XSS payloads.
Severity ?
No CVSS data available.
CWE
- CWE-79 - Cross-site Scripting (XSS)
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Credits
Bastijn Ouwendijk
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T19:28:23.788Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bastijnouwendijk.com/cve-2021-24313/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "WP Prayer",
"vendor": "Unknown",
"versions": [
{
"lessThan": "1.6.2",
"status": "affected",
"version": "1.6.2",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Bastijn Ouwendijk"
}
],
"descriptions": [
{
"lang": "en",
"value": "The WP Prayer WordPress plugin before 1.6.2 provides the functionality to store requested prayers/praises and list them on a WordPress website. These stored prayer/praise requests can be listed by using the WP Prayer engine. An authenticated WordPress user with any role can fill in the form to request a prayer. The form to request prayers or praises have several fields. The \u0027prayer request\u0027 and \u0027praise request\u0027 fields do not use proper input validation and can be used to store XSS payloads."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Cross-site Scripting (XSS)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-11T14:55:10",
"orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
"shortName": "WPScan"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bastijnouwendijk.com/cve-2021-24313/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "WP Prayer \u003c 1.6.2 - Authenticated Stored Cross-Site Scripting (XSS)",
"x_generator": "WPScan CVE Generator",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "contact@wpscan.com",
"ID": "CVE-2021-24313",
"STATE": "PUBLIC",
"TITLE": "WP Prayer \u003c 1.6.2 - Authenticated Stored Cross-Site Scripting (XSS)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WP Prayer",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "1.6.2",
"version_value": "1.6.2"
}
]
}
}
]
},
"vendor_name": "Unknown"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Bastijn Ouwendijk"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The WP Prayer WordPress plugin before 1.6.2 provides the functionality to store requested prayers/praises and list them on a WordPress website. These stored prayer/praise requests can be listed by using the WP Prayer engine. An authenticated WordPress user with any role can fill in the form to request a prayer. The form to request prayers or praises have several fields. The \u0027prayer request\u0027 and \u0027praise request\u0027 fields do not use proper input validation and can be used to store XSS payloads."
}
]
},
"generator": "WPScan CVE Generator",
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-site Scripting (XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586",
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586"
},
{
"name": "https://bastijnouwendijk.com/cve-2021-24313/",
"refsource": "MISC",
"url": "https://bastijnouwendijk.com/cve-2021-24313/"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81",
"assignerShortName": "WPScan",
"cveId": "CVE-2021-24313",
"datePublished": "2021-06-01T11:33:30",
"dateReserved": "2021-01-14T00:00:00",
"dateUpdated": "2024-08-03T19:28:23.788Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:goprayer:wp_prayer:*:*:*:*:*:wordpress:*:*\", \"versionEndExcluding\": \"1.6.2\", \"matchCriteriaId\": \"C06FDBAF-50AA-428C-96B6-10C70E5E1743\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The WP Prayer WordPress plugin before 1.6.2 provides the functionality to store requested prayers/praises and list them on a WordPress website. These stored prayer/praise requests can be listed by using the WP Prayer engine. An authenticated WordPress user with any role can fill in the form to request a prayer. The form to request prayers or praises have several fields. The \u0027prayer request\u0027 and \u0027praise request\u0027 fields do not use proper input validation and can be used to store XSS payloads.\"}, {\"lang\": \"es\", \"value\": \"El plugin WP Prayer WordPress versiones anteriores a 1.6.2, proporciona la funcionalidad para almacenar oraciones/alabanzas requeridas y enumerardas en un sitio web de WordPress. Estas peticiones de oraci\\u00f3n/alabanza almacenados puede ser listadas usando el motor de oraci\\u00f3n de WP. Un usuario de WordPress autenticado con cualquier funci\\u00f3n puede completar el formulario para pedir una oraci\\u00f3n. El formulario para pedir oraciones o alabanzas tiene varios campos. Los campos \\\"prayer request\\\" y \\\"praise request\\\" no usan la comprobaci\\u00f3n de entrada adecuada y puede sern usar para almacenar cargas \\u00fatiles de tipo XSS\"}]",
"id": "CVE-2021-24313",
"lastModified": "2024-11-21T05:52:49.390",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:N/I:P/A:N\", \"baseScore\": 3.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 6.8, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2021-06-01T14:15:08.920",
"references": "[{\"url\": \"https://bastijnouwendijk.com/cve-2021-24313/\", \"source\": \"contact@wpscan.com\", \"tags\": [\"Exploit\", \"Technical Description\", \"Third Party Advisory\"]}, {\"url\": \"https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586\", \"source\": \"contact@wpscan.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://bastijnouwendijk.com/cve-2021-24313/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Technical Description\", \"Third Party Advisory\"]}, {\"url\": \"https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "contact@wpscan.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"contact@wpscan.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-24313\",\"sourceIdentifier\":\"contact@wpscan.com\",\"published\":\"2021-06-01T14:15:08.920\",\"lastModified\":\"2024-11-21T05:52:49.390\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The WP Prayer WordPress plugin before 1.6.2 provides the functionality to store requested prayers/praises and list them on a WordPress website. These stored prayer/praise requests can be listed by using the WP Prayer engine. An authenticated WordPress user with any role can fill in the form to request a prayer. The form to request prayers or praises have several fields. The \u0027prayer request\u0027 and \u0027praise request\u0027 fields do not use proper input validation and can be used to store XSS payloads.\"},{\"lang\":\"es\",\"value\":\"El plugin WP Prayer WordPress versiones anteriores a 1.6.2, proporciona la funcionalidad para almacenar oraciones/alabanzas requeridas y enumerardas en un sitio web de WordPress. Estas peticiones de oraci\u00f3n/alabanza almacenados puede ser listadas usando el motor de oraci\u00f3n de WP. Un usuario de WordPress autenticado con cualquier funci\u00f3n puede completar el formulario para pedir una oraci\u00f3n. El formulario para pedir oraciones o alabanzas tiene varios campos. Los campos \\\"prayer request\\\" y \\\"praise request\\\" no usan la comprobaci\u00f3n de entrada adecuada y puede sern usar para almacenar cargas \u00fatiles de tipo XSS\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"contact@wpscan.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:goprayer:wp_prayer:*:*:*:*:*:wordpress:*:*\",\"versionEndExcluding\":\"1.6.2\",\"matchCriteriaId\":\"C06FDBAF-50AA-428C-96B6-10C70E5E1743\"}]}]}],\"references\":[{\"url\":\"https://bastijnouwendijk.com/cve-2021-24313/\",\"source\":\"contact@wpscan.com\",\"tags\":[\"Exploit\",\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586\",\"source\":\"contact@wpscan.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://bastijnouwendijk.com/cve-2021-24313/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…