### [CVE-2021-24230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24230) ![](https://img.shields.io/static/v1?label=Product&message=Patreon%20WordPress&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.7.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brightgreen) ### Description The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content. ### POC #### Reference No PoCs from references. #### Github - https://github.com/20142995/nuclei-templates