{"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-05-18T10:36:47.569Z"},"title":"NEX-Forms < 8.4.3 - Stored Cross-Site Scripting via CSRF","problemTypes":[{"descriptions":[{"description":"CWE-79 Cross-Site Scripting (XSS)","lang":"en","type":"CWE"}]},{"descriptions":[{"description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"NEX-Forms","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"8.4.3"}],"defaultStatus":"unaffected","collectionURL":"https://wordpress.org/plugins"}],"descriptions":[{"lang":"en","value":"The NEX-Forms WordPress plugin before 8.4.3 does not have CSRF checks in place when editing a form, and does not escape some of its settings as well as form fields before outputting them in attributes. This could allow attackers to make a logged in admin edit arbitrary forms with Cross-Site Scripting payloads in them"}],"references":[{"url":"https://wpscan.com/vulnerability/eca883d8-9499-4dbd-8fe1-4447fc2ca28a","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"Shivam Rai","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:42:16.117Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/eca883d8-9499-4dbd-8fe1-4447fc2ca28a","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24705","datePublished":"2021-12-13T10:40:44.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:42:16.117Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}