The Frontend Uploader WordPress plugin through 1.3.2 does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/165515/WordPress-Frontend-Uploader-1.3.2-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
https://wpscan.com/vulnerability/e53ef41e-a176-4d00-916a-3a03835370f1 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-10-11 11:15
Updated : 2022-02-19 04:44
NVD link : CVE-2021-24563
Mitre link : CVE-2021-24563
CVE.ORG link : CVE-2021-24563
JSON object : View
Products Affected
frontend_uploader_project
- frontend_uploader
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')