{"containers":{"cna":{"affected":[{"product":"Pixel Cat – Conversion Pixel Manager","vendor":"Unknown","versions":[{"lessThan":"2.6.2","status":"affected","version":"2.6.2","versionType":"custom"}]}],"credits":[{"lang":"en","value":"JrXnm"}],"descriptions":[{"lang":"en","value":"The Pixel Cat WordPress plugin before 2.6.2 does not have CSRF check when saving its settings, and did not sanitise as well as escape some of them, which could allow attacker to make a logged in admin change them and perform Cross-Site Scripting attacks"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-12-13T10:41:19.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/399ffd65-f3c0-4fbe-a83a-2a620976aad2"}],"source":{"discovery":"EXTERNAL"},"title":"Pixel Cat Lite < 2.6.2 - CSRF to Stored Cross-Site Scripting","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24922","STATE":"PUBLIC","TITLE":"Pixel Cat Lite < 2.6.2 - CSRF to Stored Cross-Site Scripting"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Pixel Cat – Conversion Pixel Manager","version":{"version_data":[{"version_affected":"<","version_name":"2.6.2","version_value":"2.6.2"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"JrXnm"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Pixel Cat WordPress plugin before 2.6.2 does not have CSRF check when saving its settings, and did not sanitise as well as escape some of them, which could allow attacker to make a logged in admin change them and perform Cross-Site Scripting attacks"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/399ffd65-f3c0-4fbe-a83a-2a620976aad2","refsource":"MISC","url":"https://wpscan.com/vulnerability/399ffd65-f3c0-4fbe-a83a-2a620976aad2"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:49:13.810Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/399ffd65-f3c0-4fbe-a83a-2a620976aad2"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24922","datePublished":"2021-12-13T10:41:19.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:49:13.810Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}