The plugin does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.
{"id": "WPEX-ID:64267134-9D8C-4E0C-B24F-D18692A5775E", "vendorId": null, "type": "wpexploit", "bulletinFamily": "exploit", "title": "WP HTML Author Bio <= 1.2.0 - Author+ Stored Cross-Site Scripting", "description": "The plugin does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.\n", "published": "2021-09-21T00:00:00", "modified": "2021-09-21T07:49:16", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": true}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.3, "impactScore": 2.7}, "href": "", "reporter": "Vess Razz", "references": [], "cvelist": ["CVE-2021-24545"], "immutableFields": [], "lastseen": "2021-11-26T19:18:14", "viewCount": 32, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-24545"]}, {"type": "githubexploit", "idList": ["095321CA-7E7D-560B-BF1F-0A01CDB2E813", "DE163EF6-2654-5D97-874F-AB79519656C3"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:64267134-9D8C-4E0C-B24F-D18692A5775E"]}], "rev": 4}, "score": {"value": 3.9, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-24545"]}, {"type": "githubexploit", "idList": ["095321CA-7E7D-560B-BF1F-0A01CDB2E813", "DE163EF6-2654-5D97-874F-AB79519656C3"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:64267134-9D8C-4E0C-B24F-D18692A5775E"]}]}, "exploitation": null, "vulnersScore": 3.9}, "sourceData": "Login as an author, add the following payload in the Biographical Info field of the profile: <script>alert(/XSS/)</script> \r\n\r\nThen view post made by the author to trigger the XSS", "generation": 0, "_state": {"dependencies": 1645993893}}
{"wpvulndb": [{"lastseen": "2021-11-26T19:18:14", "description": "The plugin does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.\n\n### PoC\n\nLogin as an author, add the following payload in the Biographical Info field of the profile: Then view post made by the author to trigger the XSS\n", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 5.4, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 2.7}, "published": "2021-09-21T00:00:00", "type": "wpvulndb", "title": "WP HTML Author Bio <= 1.2.0 - Author+ Stored Cross-Site Scripting", "bulletinFamily": "software", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24545"], "modified": "2021-09-21T07:49:16", "id": "WPVDB-ID:64267134-9D8C-4E0C-B24F-D18692A5775E", "href": "https://wpscan.com/vulnerability/64267134-9d8c-4e0c-b24f-d18692a5775e", "sourceData": "", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}}], "githubexploit": [{"lastseen": "2021-12-10T14:14:18", "description": "# CVE-2021-24545\n\n\ud604\uc7ac\ub294 plugin\uc73c\ub85c \ubc30\ud3ec\uac00 \uc911\ub2e8\ub418\uc5b4 \uc788\ub294 \ud50c\ub7ec\uadf8\uc778\uc5d0\uc11c \ubc1c\uacac\ub41c XSS \ucde8\uc57d\uc810\uc785\ub2c8\ub2e4...", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 5.4, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 2.7}, "published": "2021-11-03T05:41:46", "type": "githubexploit", "title": "Exploit for Cross-site Scripting in Wp Html Author Bio Project Wp Html Author Bio", "bulletinFamily": "exploit", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24545"], "modified": "2021-11-03T05:49:47", "id": "095321CA-7E7D-560B-BF1F-0A01CDB2E813", "href": "", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "privateArea": 1}, {"lastseen": "2021-12-10T15:36:20", "description": "# CVE-2021-24545\n\nWP HTML Author Bio <= 1.2.0 - Author+ Stored C...", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 5.4, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 2.7}, "published": "2021-10-05T06:28:05", "type": "githubexploit", "title": "Exploit for Cross-site Scripting in Wp Html Author Bio Project Wp Html Author Bio", "bulletinFamily": "exploit", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24545"], "modified": "2021-10-12T14:24:58", "id": "DE163EF6-2654-5D97-874F-AB79519656C3", "href": "", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "privateArea": 1}], "cve": [{"lastseen": "2022-03-23T14:56:52", "description": "The WP HTML Author Bio WordPress plugin through 1.2.0 does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2021-10-11T11:15:00", "type": "cve", "title": "CVE-2021-24545", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24545"], "modified": "2021-10-15T16:32:00", "cpe": ["cpe:/a:wp_html_author_bio_project:wp_html_author_bio:1.2.0"], "id": "CVE-2021-24545", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24545", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:wp_html_author_bio_project:wp_html_author_bio:1.2.0:*:*:*:*:wordpress:*:*"]}], "patchstack": [{"lastseen": "2022-06-01T19:30:00", "description": "Stored Cross-Site Scripting (XSS) vulnerability discovered by Veshraj Ghimire in WordPress WP HTML Author Bio plugin (versions <= 1.2.0).\n\n## Solution\n\n\nDeactivate and delete. This plugin has been closed as of July 19, 2021 and is not available for download. Reason: Security Issue.\r\n ", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2021-09-21T00:00:00", "type": "patchstack", "title": "WordPress WP HTML Author Bio plugin <= 1.2.0 - Stored Cross-Site Scripting (XSS) vulnerability", "bulletinFamily": "software", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24545"], "modified": "2021-09-21T00:00:00", "id": "PATCHSTACK:DC29BBD9536358C4F8A877A49D4BBF62", "href": "https://patchstack.com/database/vulnerability/wp-html-author-bio-by-ahmad-awais/wordpress-wp-html-author-bio-plugin-1-2-0-stored-cross-site-scripting-xss-vulnerability", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}}]}