Files
CVEs-PoC/2021/CVE-2021-24412.md
2025-09-29 21:09:30 +02:00

18 lines
917 B
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
### [CVE-2021-24412](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24412)
![](https://img.shields.io/static/v1?label=Product&message=Html5%20Audio%20Player%20%E2%80%93%20Audio%20Player%20for%20WordPress&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.1.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen)
### Description
The Html5 Audio Player Audio Player for WordPress plugin before 2.1.3 does not sanitise or validate the parameters from its shortcode, allowing users with a role as low as contributor to set Cross-Site Scripting payload in them which will be triggered in the page/s with the embed malicious shortcode
### POC
#### Reference
- https://wpscan.com/vulnerability/c4ed3e52-cbe0-46dc-ab43-65de78cfb225
#### Github
- https://github.com/20142995/nuclei-templates