Files
CVEs-PoC/2021/CVE-2021-24413.md
2025-09-29 21:09:30 +02:00

18 lines
843 B
Markdown

### [CVE-2021-24413](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24413)
![](https://img.shields.io/static/v1?label=Product&message=Easy%20Twitter%20Feed&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brightgreen)
### Description
The Easy Twitter Feed WordPress plugin before 1.2 does not sanitise or validate the parameters from its shortcode, allowing users with a role as low as contributor to set Cross-Site Scripting payload in them which will be triggered in the page/s with the embed malicious shortcode
### POC
#### Reference
- https://wpscan.com/vulnerability/ce6d17c3-6741-4c80-ab13-e1824960ae24
#### Github
- https://github.com/20142995/nuclei-templates