Vulnerability Description
The My Calendar WordPress plugin before 3.2.18 does not sanitise and escape the callback parameter of the mc_post_lookup AJAX action (available to any authenticated user) before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| My Calendar Project | My Calendar | < 3.2.18 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/86f3acc7-8902-4215-bd75-6105d601524eExploitThird Party Advisory
- https://wpscan.com/vulnerability/86f3acc7-8902-4215-bd75-6105d601524eExploitThird Party Advisory
FAQ
What is CVE-2021-24927?
CVE-2021-24927 is a vulnerability with a CVSS score of 5.4 (MEDIUM). The My Calendar WordPress plugin before 3.2.18 does not sanitise and escape the callback parameter of the mc_post_lookup AJAX action (available to any authenticated user) before outputting it back in ...
How severe is CVE-2021-24927?
CVE-2021-24927 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-24927?
Check the references section above for vendor advisories and patch information. Affected products include: My Calendar Project My Calendar.