{"containers":{"cna":{"affected":[{"product":"St-Daily-Tip","vendor":"Unknown","versions":[{"lessThanOrEqual":"4.7","status":"affected","version":"4.7","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Akash Rajendra Patil"}],"descriptions":[{"lang":"en","value":"The St-Daily-Tip WordPress plugin through 4.7 does not have any CSRF check in place when saving its 'Default Text to Display if no tips' setting, and was also lacking sanitisation as well as escaping before outputting it the page. This could allow attacker to make logged in administrators set a malicious payload in it, leading to a Stored Cross-Site Scripting issue"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-10-25T13:20:36.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/def352f8-1bbe-4263-ad1a-1486140269f4"}],"source":{"discovery":"EXTERNAL"},"title":"St Daily Tip <= 4.7 - CSRF to Stored Cross-Site Scripting","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24487","STATE":"PUBLIC","TITLE":"St Daily Tip <= 4.7 - CSRF to Stored Cross-Site Scripting"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"St-Daily-Tip","version":{"version_data":[{"version_affected":"<=","version_name":"4.7","version_value":"4.7"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Akash Rajendra Patil"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The St-Daily-Tip WordPress plugin through 4.7 does not have any CSRF check in place when saving its 'Default Text to Display if no tips' setting, and was also lacking sanitisation as well as escaping before outputting it the page. This could allow attacker to make logged in administrators set a malicious payload in it, leading to a Stored Cross-Site Scripting issue"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)"}]},{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/def352f8-1bbe-4263-ad1a-1486140269f4","refsource":"MISC","url":"https://wpscan.com/vulnerability/def352f8-1bbe-4263-ad1a-1486140269f4"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:35:20.144Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/def352f8-1bbe-4263-ad1a-1486140269f4"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24487","datePublished":"2021-10-25T13:20:36.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:35:20.144Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}