Description
Stored Cross-Site Scripting vulnerabilities in Themify Portfolio Post <= 1.1.5 allow low-privileged users (Contributor+) to inject arbitrary Javascript code or HTML in posts where the Themify Custom Panel is embedded.
Related
{"id": "WPEX-ID:C8537E5F-1948-418B-9D29-3CF50CD8F9A6", "type": "wpexploit", "bulletinFamily": "exploit", "title": "Themify Portfolio Post < 1.1.6 - Authenticated Stored Cross-Site Scripting", "description": "Stored Cross-Site Scripting vulnerabilities in Themify Portfolio Post <= 1.1.5 allow low-privileged users (Contributor+) to inject arbitrary Javascript code or HTML in posts where the Themify Custom Panel is embedded.\n", "published": "2020-12-04T00:00:00", "modified": "2021-01-22T06:01:13", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "", "reporter": "Nguyen Anh Tien", "references": ["https://plugins.trac.wordpress.org/changeset/2431145/themify-portfolio-post/trunk/includes/themify-metabox/includes/themify-metabox-core.php?old=2393969"], "cvelist": ["CVE-2021-24129"], "lastseen": "2021-02-15T22:21:36", "viewCount": 89, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-24129"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:C8537E5F-1948-418B-9D29-3CF50CD8F9A6"]}], "rev": 4}, "score": {"value": 3.9, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-24129"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:C8537E5F-1948-418B-9D29-3CF50CD8F9A6"]}]}, "exploitation": null, "vulnersScore": 3.9}, "sourceData": "1. As a contributor, go into \"Portfolios\" tab from the sidebar and create a new Portfolios\r\n\r\n2. In the Themify Custom Panel section, Input an XSS vector to :\r\n- Date\r\n- Client\r\n- Services\r\n- Link to Launch\r\n\r\nex: <img src=x onerror=alert(origin)>\r\n\r\n3. Publish/Send for review and visit created post/preview as editor/admin to trigger XSS. ", "generation": 1, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1646085324}}
{"wpvulndb": [{"lastseen": "2021-02-15T22:21:36", "bulletinFamily": "software", "cvelist": ["CVE-2021-24129"], "description": "Stored Cross-Site Scripting vulnerabilities in Themify Portfolio Post <= 1.1.5 allow low-privileged users (Contributor+) to inject arbitrary Javascript code or HTML in posts where the Themify Custom Panel is embedded.\n\n### PoC\n\n1\\. As a contributor, go into \"Portfolios\" tab from the sidebar and create a new Portfolios 2\\. In the Themify Custom Panel section, Input an XSS vector to : \\- Date \\- Client \\- Services \\- Link to Launch ex:  3\\. Publish/Send for review and visit created post/preview as editor/admin to trigger XSS. \n", "modified": "2021-01-22T06:01:13", "published": "2020-12-04T00:00:00", "id": "WPVDB-ID:C8537E5F-1948-418B-9D29-3CF50CD8F9A6", "href": "https://wpscan.com/vulnerability/c8537e5f-1948-418b-9d29-3cf50cd8f9a6", "type": "wpvulndb", "title": "Themify Portfolio Post < 1.1.6 - Authenticated Stored Cross-Site Scripting", "sourceData": "", "cvss": {"score": 0.0, "vector": "NONE"}}], "cve": [{"lastseen": "2022-03-23T14:47:21", "description": "Unvalidated input and lack of output encoding in the Themify Portfolio Post WordPress plugin, versions before 1.1.6, lead to Stored Cross-Site Scripting (XSS) vulnerabilities allowing low-privileged users (Contributor+) to inject arbitrary JavaScript code or HTML in posts where the Themify Custom Panel is embedded, which could lead to privilege escalation.", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2021-03-18T15:15:00", "type": "cve", "title": "CVE-2021-24129", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24129"], "modified": "2021-03-24T17:11:00", "cpe": [], "id": "CVE-2021-24129", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24129", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "cpe23": []}]}