The Anti-Malware Security and Brute-Force Firewall WordPress plugin before 4.20.94 does not sanitise and escape the POST data before outputting it back in attributes of an admin page, leading to a Reflected Cross-Site scripting. Due to the presence of specific parameter value, available to admin users, this can only be exploited by an admin against another admin user.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/5fd0380c-0d1d-4380-96f0-a07be5a61eba | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-02-21T10:45:56
Updated: 2022-02-21T10:45:56
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-25101
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-02-21T11:15:08.920
Modified: 2022-02-28T20:43:07.457
Link: CVE-2021-25101
JSON object: View
Redhat Information
No data.
CWE