Files
CVEs-PoC/2021/CVE-2021-24322.md
T
2024-06-18 02:51:15 +02:00

19 lines
899 B
Markdown

### [CVE-2021-24322](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24322)
![](https://img.shields.io/static/v1?label=Product&message=Database%20Backup%20for%20WordPress&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.4%3C%202.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Database Backup for WordPress plugin before 2.4 did not escape the backup_recipient POST parameter in before output it back in the attribute of an HTML tag, leading to a Stored Cross-Site Scripting issue.
### POC
#### Reference
- https://m0ze.ru/vulnerability/%5B2021-04-04%5D-%5BWordPress%5D-%5BCWE-79%5D-WP-DB-Backup-WordPress-Plugin-v2.3.3.txt
- https://wpscan.com/vulnerability/6bea6301-0762-45c3-a4eb-15d6ac4f9f37
#### Github
No PoCs found on GitHub currently.