Lucene search

K
cve[email protected]CVE-2021-4252
HistoryDec 18, 2022 - 10:15 p.m.

CVE-2021-4252

2022-12-1822:15:10
CWE-707
web.nvd.nist.gov
31
cve-2021-4252
wp-ban
vulnerability
remote code execution
cross-site scripting
http_user_agent manipulation
patch
nvd

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

30.4%

A vulnerability, which was classified as problematic, has been found in WP-Ban. This issue affects the function toggle_checkbox of the file ban-options.php. The manipulation of the argument $_SERVER[“HTTP_USER_AGENT”] leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 13e0b1e922f3aaa3f8fcb1dd6d50200dd693fd76. It is recommended to apply a patch to fix this issue. The identifier VDB-216209 was assigned to this vulnerability.

Affected configurations

NVD
Node
wp-ban_projectwp-banRange<2021-11-24wordpress

CNA Affected

[
  {
    "vendor": "unspecified",
    "product": "WP-Ban",
    "versions": [
      {
        "version": "n/a",
        "status": "affected"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

30.4%

Related for CVE-2021-4252