5.4

CVE-2021-24494

Exploit

WP Offload SES Lite <= 1.4.4 - Stored Cross-Site Scripting

The WP Offload SES Lite WordPress plugin before 1.4.5 did not escape some of the fields in the Activity page of the admin dashboard, such as the email's id, subject and recipient, which could lead to Stored Cross-Site Scripting issues when an attacker can control any of these fields, like the subject when filling a contact form for example. The XSS will be executed in the context of a logged in admin viewing the Activity tab of the plugin.
Mögliche Gegenmaßnahme
WP Offload SES Lite: Update to version 1.4.5, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt WP Offload SES Lite
Version *-1.4.4
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DeliciousbrainsWp Offload Ses Lite SwPlatformwordpress Version < 1.4.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.47% 0.635
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.4 2.3 2.7
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
nvd@nist.gov 3.5 6.8 2.9
AV:N/AC:M/Au:S/C:N/I:P/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.