{"containers":{"cna":{"affected":[{"product":"WP Page Builder","vendor":"Unknown","versions":[{"lessThan":"1.2.4","status":"affected","version":"1.2.4","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Ramuel Gall"}],"descriptions":[{"lang":"en","value":"The editor of the WP Page Builder WordPress plugin before 1.2.4 allows lower-privileged users to insert unfiltered HTML, including JavaScript, into pages via the “Raw HTML” widget and the “Custom HTML” widgets (though the custom HTML widget requires sending a crafted request - it appears that this widget uses some form of client side validation but not server side validation), all of which are added via the “page_builder_data” parameter when performing the “wppb_page_save” AJAX action. It is also possible to insert malicious JavaScript via the “wppb_page_css” parameter (this can be done by closing out the style tag and opening a script tag) when performing the “wppb_page_save” AJAX action."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-04-05T18:27:46.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.themeum.com/wp-page-builder-updated-v1-2-4/"},{"tags":["x_refsource_CONFIRM"],"url":"https://wpscan.com/vulnerability/c20e243d-b0de-4ae5-9a0d-b9d02c9b8141"}],"source":{"discovery":"UNKNOWN"},"title":"WP Page Builder < 1.2.4 - Multiple Stored Cross-Site scripting (XSS)","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24208","STATE":"PUBLIC","TITLE":"WP Page Builder < 1.2.4 - Multiple Stored Cross-Site scripting (XSS)"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"WP Page Builder","version":{"version_data":[{"version_affected":"<","version_name":"1.2.4","version_value":"1.2.4"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Ramuel Gall"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The editor of the WP Page Builder WordPress plugin before 1.2.4 allows lower-privileged users to insert unfiltered HTML, including JavaScript, into pages via the “Raw HTML” widget and the “Custom HTML” widgets (though the custom HTML widget requires sending a crafted request - it appears that this widget uses some form of client side validation but not server side validation), all of which are added via the “page_builder_data” parameter when performing the “wppb_page_save” AJAX action. It is also possible to insert malicious JavaScript via the “wppb_page_css” parameter (this can be done by closing out the style tag and opening a script tag) when performing the “wppb_page_save” AJAX action."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://www.themeum.com/wp-page-builder-updated-v1-2-4/","refsource":"MISC","url":"https://www.themeum.com/wp-page-builder-updated-v1-2-4/"},{"name":"https://wpscan.com/vulnerability/c20e243d-b0de-4ae5-9a0d-b9d02c9b8141","refsource":"CONFIRM","url":"https://wpscan.com/vulnerability/c20e243d-b0de-4ae5-9a0d-b9d02c9b8141"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:21:18.776Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.themeum.com/wp-page-builder-updated-v1-2-4/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://wpscan.com/vulnerability/c20e243d-b0de-4ae5-9a0d-b9d02c9b8141"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24208","datePublished":"2021-04-05T18:27:46.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:21:18.776Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}