The Anti-Malware Security and Brute-Force Firewall WordPress plugin before 4.20.94 does not sanitise and escape the POST data before outputting it back in attributes of an admin page, leading to a Reflected Cross-Site scripting. Due to the presence of specific parameter value, available to admin users, this can only be exploited by an admin against another admin user.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/5fd0380c-0d1d-4380-96f0-a07be5a61eba | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/5fd0380c-0d1d-4380-96f0-a07be5a61eba | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-02-21 11:15
Updated : 2024-11-21 05:54
NVD link : CVE-2021-25101
Mitre link : CVE-2021-25101
CVE.ORG link : CVE-2021-25101
JSON object : View
Products Affected
anti-malware_security_and_brute-force_firewall_project
- anti-malware_security_and_brute-force_firewall
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')