The Advanced Custom Fields Pro WordPress plugin before 5.9.1 did not properly escape the generated update URL when outputting it in an attribute, leading to a reflected Cross-Site Scripting issue in the update settings page.
References
Link | Resource |
---|---|
https://github.com/jdordonezn/Reflected-XSS-in-WordPress-for-ACF-PRO-before-5.9.1-plugin/issues/1 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/d1e9c995-37bd-4952-b88e-945e02e3c83f | Exploit Third Party Advisory |
https://www.advancedcustomfields.com/blog/acf-5-9-1-release/ | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2021-04-22T21:00:51
Updated: 2021-04-22T21:00:51
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24241
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-04-22T21:15:09.893
Modified: 2021-04-29T20:51:46.737
Link: CVE-2021-24241
JSON object: View
Redhat Information
No data.
CWE