Vulnerability Description
The St-Daily-Tip WordPress plugin through 4.7 does not have any CSRF check in place when saving its 'Default Text to Display if no tips' setting, and was also lacking sanitisation as well as escaping before outputting it the page. This could allow attacker to make logged in administrators set a malicious payload in it, leading to a Stored Cross-Site Scripting issue
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sanskruti | St-Daily-Tip | <= 4.7 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/def352f8-1bbe-4263-ad1a-1486140269f4ExploitThird Party Advisory
- https://wpscan.com/vulnerability/def352f8-1bbe-4263-ad1a-1486140269f4ExploitThird Party Advisory
FAQ
What is CVE-2021-24487?
CVE-2021-24487 is a vulnerability with a CVSS score of 8.8 (HIGH). The St-Daily-Tip WordPress plugin through 4.7 does not have any CSRF check in place when saving its 'Default Text to Display if no tips' setting, and was also lacking sanitisation as well as escaping ...
How severe is CVE-2021-24487?
CVE-2021-24487 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-24487?
Check the references section above for vendor advisories and patch information. Affected products include: Sanskruti St-Daily-Tip.