Files
CVEs-PoC/2021/CVE-2021-24201.md
T
2024-06-18 02:51:15 +02:00

18 lines
1.1 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
### [CVE-2021-24201](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24201)
![](https://img.shields.io/static/v1?label=Product&message=Elementor%20Website%20Builder&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.1.4%3C%203.1.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
In the Elementor Website Builder WordPress plugin before 3.1.4, the column element (includes/elements/column.php) accepts an html_tag parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified save_builder request containing JavaScript in the html_tag parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed.
### POC
#### Reference
- https://wpscan.com/vulnerability/9647f516-b130-4cc8-85fb-2e69b034ced0
#### Github
No PoCs found on GitHub currently.