Files
CVEs-PoC/2021/CVE-2021-24680.md
T
2024-06-18 02:51:15 +02:00

18 lines
928 B
Markdown

### [CVE-2021-24680](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24680)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Travel%20Engine%20%E2%80%93%20Travel%20and%20Tour%20Booking%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=5.3.1%3C%205.3.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WP Travel Engine WordPress plugin before 5.3.1 does not escape the Description field in the Trip Destination/Activities/Trip Type and Pricing Category pages, allowing users with a role as low as editor to perform Stored Cross-Site Scripting attacks, even when the unfiltered_html capability is disallowed
### POC
#### Reference
- https://wpscan.com/vulnerability/30f2a0d5-7959-436c-9860-2535020e82d3
#### Github
- https://github.com/ARPSyndicate/cvemon