Files
CVEs-PoC/2021/CVE-2021-24838.md
2025-09-29 21:09:30 +02:00

20 lines
936 B
Markdown

### [CVE-2021-24838](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24838)
![](https://img.shields.io/static/v1?label=Product&message=AnyComment&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0.3.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20('Open%20Redirect')&color=brightgreen)
### Description
The AnyComment WordPress plugin before 0.3.5 has an API endpoint which passes user input via the redirect parameter to the wp_redirect() function without being validated first, leading to an Open Redirect issue, which according to the vendor, is a feature.
### POC
#### Reference
- https://wpscan.com/vulnerability/562e81ad-7422-4437-a5b4-fcab9379db82
#### Github
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates