{"containers":{"cna":{"affected":[{"product":"YOP Poll","vendor":"Unknown","versions":[{"lessThan":"6.3.1","status":"affected","version":"6.3.1","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Vishnupriya Ilango"}],"descriptions":[{"lang":"en","value":"The YOP Poll WordPress plugin before 6.3.1 is affected by a stored Cross-Site Scripting vulnerability, which exists in the Admin preview module where a user with a role as low as author is allowed to execute arbitrary script code within the context of the application. This vulnerability is due to insufficient validation of question and answer text parameters in Create Poll module."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-11-17T10:15:46.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/7cb39087-fbab-463d-9592-003e3fca6d34"},{"tags":["x_refsource_CONFIRM"],"url":"https://plugins.trac.wordpress.org/changeset/2605368"},{"tags":["x_refsource_MISC"],"url":"https://www.fortiguard.com/zeroday/FG-VD-21-052"}],"source":{"discovery":"EXTERNAL"},"title":"YOP Poll < 6.3.1 - Author+ Stored Cross-Site Scripting via Preview Module","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24833","STATE":"PUBLIC","TITLE":"YOP Poll < 6.3.1 - Author+ Stored Cross-Site Scripting via Preview Module"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"YOP Poll","version":{"version_data":[{"version_affected":"<","version_name":"6.3.1","version_value":"6.3.1"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Vishnupriya Ilango"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The YOP Poll WordPress plugin before 6.3.1 is affected by a stored Cross-Site Scripting vulnerability, which exists in the Admin preview module where a user with a role as low as author is allowed to execute arbitrary script code within the context of the application. This vulnerability is due to insufficient validation of question and answer text parameters in Create Poll module."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/7cb39087-fbab-463d-9592-003e3fca6d34","refsource":"MISC","url":"https://wpscan.com/vulnerability/7cb39087-fbab-463d-9592-003e3fca6d34"},{"name":"https://plugins.trac.wordpress.org/changeset/2605368","refsource":"CONFIRM","url":"https://plugins.trac.wordpress.org/changeset/2605368"},{"name":"https://www.fortiguard.com/zeroday/FG-VD-21-052","refsource":"MISC","url":"https://www.fortiguard.com/zeroday/FG-VD-21-052"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:42:17.229Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/7cb39087-fbab-463d-9592-003e3fca6d34"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset/2605368"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.fortiguard.com/zeroday/FG-VD-21-052"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24833","datePublished":"2021-11-17T10:15:46.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:42:17.229Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}