Vulnerability Description
The WP System Log WordPress plugin before 1.0.21 does not sanitise, validate and escape the IP address retrieved from login requests before outputting them in the admin dashboard, which could allow unauthenticated attacker to perform Cross-Site Scripting attacks against admins viewing the logs.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wp System Log Project | Wp System Log | < 1.0.21 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/0cea0717-8f54-4f1c-b3ee-aff7dd91bf59ExploitThird Party Advisory
- https://wpscan.com/vulnerability/0cea0717-8f54-4f1c-b3ee-aff7dd91bf59ExploitThird Party Advisory
FAQ
What is CVE-2021-24756?
CVE-2021-24756 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The WP System Log WordPress plugin before 1.0.21 does not sanitise, validate and escape the IP address retrieved from login requests before outputting them in the admin dashboard, which could allow un...
How severe is CVE-2021-24756?
CVE-2021-24756 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-24756?
Check the references section above for vendor advisories and patch information. Affected products include: Wp System Log Project Wp System Log.