mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
23 lines
1.1 KiB
Markdown
23 lines
1.1 KiB
Markdown
### [CVE-2021-24910](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24910)
|
|

|
|

|
|
&color=brightgreen)
|
|
|
|
### Description
|
|
|
|
The Transposh WordPress Translation WordPress plugin before 1.0.8 does not sanitise and escape the a parameter via an AJAX action (available to both unauthenticated and authenticated users when the curl library is installed) before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://wpscan.com/vulnerability/b5cbebf4-5749-41a0-8be3-3333853fca17
|
|
|
|
#### Github
|
|
- https://github.com/20142995/nuclei-templates
|
|
- https://github.com/ARPSyndicate/cve-scores
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
- https://github.com/MrTuxracer/advisories
|
|
- https://github.com/oferwald/transposh
|
|
|