GetPaid < 2.3.4 - Authenticated Stored XSS
CVE-2021-24369

5.4MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
21 June 2021

What is CVE-2021-24369?

In the GetPaid WordPress plugin before 2.3.4, users with the contributor role and above can create a new Payment Form, however the Label and Help Text input fields were not getting sanitized properly. So it was possible to inject malicious content such as img tags, leading to a Stored Cross-Site Scripting issue which is triggered when the form will be edited, for example when an admin reviews it and could lead to privilege escalation.

Affected Version(s)

WordPress Payments Plugin | GetPaid 2.3.4

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jörg Steinsträter
.