{"containers":{"cna":{"affected":[{"product":"Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WPLegalPages","vendor":"Unknown","versions":[{"lessThan":"2.7.1","status":"affected","version":"2.7.1","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Krzysztof Zając"}],"descriptions":[{"lang":"en","value":"The Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WPLegalPages WordPress plugin before 2.7.1 does not check for authorisation and has a flawed CSRF logic when saving its settings, allowing any authenticated users, such as subscriber, to update them. Furthermore, due to the lack of sanitisation and escaping, it could lead to Stored Cross-Site Scripting"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-02-07T15:47:23.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/47df802d-5200-484b-959c-9f569edf992e"}],"source":{"discovery":"EXTERNAL"},"title":"WPLegalPages < 2.7.1 - Subscriber+ Arbitrary Settings Update to Stored XSS","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-25106","STATE":"PUBLIC","TITLE":"WPLegalPages < 2.7.1 - Subscriber+ Arbitrary Settings Update to Stored XSS"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WPLegalPages","version":{"version_data":[{"version_affected":"<","version_name":"2.7.1","version_value":"2.7.1"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Krzysztof Zając"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WPLegalPages WordPress plugin before 2.7.1 does not check for authorisation and has a flawed CSRF logic when saving its settings, allowing any authenticated users, such as subscriber, to update them. Furthermore, due to the lack of sanitisation and escaping, it could lead to Stored Cross-Site Scripting"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/47df802d-5200-484b-959c-9f569edf992e","refsource":"MISC","url":"https://wpscan.com/vulnerability/47df802d-5200-484b-959c-9f569edf992e"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:56:09.976Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/47df802d-5200-484b-959c-9f569edf992e"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-25106","datePublished":"2022-02-07T15:47:23.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:56:09.976Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}