Files
CVEs-PoC/2021/CVE-2021-24306.md
2025-09-29 21:09:30 +02:00

18 lines
1.1 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
### [CVE-2021-24306](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24306)
![](https://img.shields.io/static/v1?label=Product&message=Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20User%20Registration%2C%20Login%20%26%20Membership%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.1.20%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen)
### Description
The Ultimate Member User Profile, User Registration, Login & Membership Plugin WordPress plugin before 2.1.20 did not properly sanitise, validate or encode the query string when generating a link to edit user's own profile, leading to an authenticated reflected Cross-Site Scripting issue. Knowledge of the targeted username is required to exploit this, and attackers would then need to make the related logged in user open a malicious link.
### POC
#### Reference
- https://wpscan.com/vulnerability/35516555-c50c-486a-886c-df49c9e51e2c
#### Github
- https://github.com/20142995/nuclei-templates