Vulnerability Description
The WP Prayer WordPress plugin before 1.6.2 provides the functionality to store requested prayers/praises and list them on a WordPress website. These stored prayer/praise requests can be listed by using the WP Prayer engine. An authenticated WordPress user with any role can fill in the form to request a prayer. The form to request prayers or praises have several fields. The 'prayer request' and 'praise request' fields do not use proper input validation and can be used to store XSS payloads.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Goprayer | Wp Prayer | < 1.6.2 |
Related Weaknesses (CWE)
References
- https://bastijnouwendijk.com/cve-2021-24313/ExploitTechnical DescriptionThird Party Advisory
- https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586ExploitThird Party Advisory
- https://bastijnouwendijk.com/cve-2021-24313/ExploitTechnical DescriptionThird Party Advisory
- https://wpscan.com/vulnerability/c7ab736d-27c4-4ec5-9681-a3f0dda86586ExploitThird Party Advisory
FAQ
What is CVE-2021-24313?
CVE-2021-24313 is a vulnerability with a CVSS score of 5.4 (MEDIUM). The WP Prayer WordPress plugin before 1.6.2 provides the functionality to store requested prayers/praises and list them on a WordPress website. These stored prayer/praise requests can be listed by usi...
How severe is CVE-2021-24313?
CVE-2021-24313 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-24313?
Check the references section above for vendor advisories and patch information. Affected products include: Goprayer Wp Prayer.