{"containers":{"cna":{"affected":[{"product":"Donate With QRCode","vendor":"Unknown","versions":[{"lessThan":"1.4.5","status":"affected","version":"1.4.5","versionType":"custom"}]}],"credits":[{"lang":"en","value":"yangshengcheng@webray.com.cn inc"}],"descriptions":[{"lang":"en","value":"The Donate With QRCode WordPress plugin before 1.4.5 does not sanitise or escape its QRCode Image setting, which result into a Stored Cross-Site Scripting (XSS). Furthermore, the plugin also does not have any CSRF and capability checks in place when saving such setting, allowing any authenticated user (as low as subscriber), or unauthenticated user via a CSRF vector to update them and perform such attack."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-09-20T10:06:37.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/d50b801a-16b5-45e9-a465-e3bb0445cb49"}],"source":{"discovery":"UNKNOWN"},"title":"Donate With QRCode < 1.4.5 - Stored Cross-Site Scripting","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24618","STATE":"PUBLIC","TITLE":"Donate With QRCode < 1.4.5 - Stored Cross-Site Scripting"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Donate With QRCode","version":{"version_data":[{"version_affected":"<","version_name":"1.4.5","version_value":"1.4.5"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"yangshengcheng@webray.com.cn inc"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Donate With QRCode WordPress plugin before 1.4.5 does not sanitise or escape its QRCode Image setting, which result into a Stored Cross-Site Scripting (XSS). Furthermore, the plugin also does not have any CSRF and capability checks in place when saving such setting, allowing any authenticated user (as low as subscriber), or unauthenticated user via a CSRF vector to update them and perform such attack."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]},{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/d50b801a-16b5-45e9-a465-e3bb0445cb49","refsource":"MISC","url":"https://wpscan.com/vulnerability/d50b801a-16b5-45e9-a465-e3bb0445cb49"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:35:20.292Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/d50b801a-16b5-45e9-a465-e3bb0445cb49"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24618","datePublished":"2021-09-20T10:06:37.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:35:20.292Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}