{"containers":{"cna":{"affected":[{"product":"WooCommerce","vendor":"Automattic","versions":[{"lessThan":"5.2.0","status":"affected","version":"5.2.0","versionType":"custom"}]}],"credits":[{"lang":"en","value":"m0ze"}],"descriptions":[{"lang":"en","value":"When taxes are enabled, the \"Additional tax classes\" field was not properly sanitised or escaped before being output back in the admin dashboard, allowing high privilege users such as admin to use XSS payloads even when the unfiltered_html is disabled"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-05-17T16:48:53.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://wpscan.com/vulnerability/6d262555-7ae4-4e36-add6-4baa34dc3010"}],"source":{"discovery":"UNKNOWN"},"title":"Woocommerce < 5.2.0 - Authenticated Stored Cross-Site Scripting (XSS)","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24323","STATE":"PUBLIC","TITLE":"Woocommerce < 5.2.0 - Authenticated Stored Cross-Site Scripting (XSS)"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"WooCommerce","version":{"version_data":[{"version_affected":"<","version_name":"5.2.0","version_value":"5.2.0"}]}}]},"vendor_name":"Automattic"}]}},"credit":[{"lang":"eng","value":"m0ze"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"When taxes are enabled, the \"Additional tax classes\" field was not properly sanitised or escaped before being output back in the admin dashboard, allowing high privilege users such as admin to use XSS payloads even when the unfiltered_html is disabled"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/6d262555-7ae4-4e36-add6-4baa34dc3010","refsource":"CONFIRM","url":"https://wpscan.com/vulnerability/6d262555-7ae4-4e36-add6-4baa34dc3010"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:28:23.704Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://wpscan.com/vulnerability/6d262555-7ae4-4e36-add6-4baa34dc3010"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24323","datePublished":"2021-05-17T16:48:53.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:28:23.704Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}