5.4

CVE-2021-24822

Exploit

Stylish Cost Calculator <= 7.0.3 - Stored Cross-Site Scripting

The Stylish Cost Calculator WordPress plugin before 7.0.4 does not have any authorisation and CSRF checks on some of its AJAX actions (available to authenticated users), which could allow any authenticated users, such as subscriber to call them, and perform Stored Cross-Site Scripting attacks against logged in admin, as well as frontend users due to the lack of sanitisation and escaping in some parameters
Mögliche Gegenmaßnahme
Stylish Cost Calculator – Quote Generator, Lead Gen & Price Estimator: Update to version 7.0.4, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Stylish Cost Calculator – Quote Generator, Lead Gen & Price Estimator
Version *-7.0.3
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
StylishcostcalculatorStylish Cost Calculator SwPlatformwordpress Version < 7.0.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.11% 0.294
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.4 2.3 2.7
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
nvd@nist.gov 3.5 6.8 2.9
AV:N/AC:M/Au:S/C:N/I:P/A:N
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.