{"containers":{"cna":{"affected":[{"product":"Per page add to head","vendor":"Unknown","versions":[{"lessThan":"1.4.4","status":"affected","version":"1.4.4","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Prashant Karman Patel"}],"descriptions":[{"lang":"en","value":"The Per page add to head WordPress plugin before 1.4.4 is lacking any CSRF check when saving its settings, which could allow attackers to make a logged in admin change them. Furthermore, as the plugin allows arbitrary HTML to be inserted in one of the setting (feature mentioned by the plugin), this could lead to Stored XSS issue which will be triggered either in the backend, frontend or both depending on the payload used."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-09-13T17:56:27.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/e9885fba-0e73-41a0-9e1d-47badc09be85"}],"source":{"discovery":"UNKNOWN"},"title":"Per Page Add to Head < 1.4.4 - CSRF to Stored XSS","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24586","STATE":"PUBLIC","TITLE":"Per Page Add to Head < 1.4.4 - CSRF to Stored XSS"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Per page add to head","version":{"version_data":[{"version_affected":"<","version_name":"1.4.4","version_value":"1.4.4"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Prashant Karman Patel"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Per page add to head WordPress plugin before 1.4.4 is lacking any CSRF check when saving its settings, which could allow attackers to make a logged in admin change them. Furthermore, as the plugin allows arbitrary HTML to be inserted in one of the setting (feature mentioned by the plugin), this could lead to Stored XSS issue which will be triggered either in the backend, frontend or both depending on the payload used."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)"}]},{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/e9885fba-0e73-41a0-9e1d-47badc09be85","refsource":"MISC","url":"https://wpscan.com/vulnerability/e9885fba-0e73-41a0-9e1d-47badc09be85"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:35:20.192Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/e9885fba-0e73-41a0-9e1d-47badc09be85"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24586","datePublished":"2021-09-13T17:56:27.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:35:20.192Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}