
Cloud Vulnerability DB
A community-led vulnerabilities database
The Blue Admin WordPress plugin through version 21.06.01 contains a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2021-24581. The vulnerability was discovered and publicly disclosed on July 27, 2021. The issue affects the plugin's 'Logo Title' setting functionality, which lacks proper input sanitization and CSRF protection (WPScan Report).
The vulnerability stems from two main security issues: First, the plugin fails to sanitize or escape the 'Logo Title' setting before outputting it in a page, leading to a Stored Cross-Site Scripting vulnerability. Second, the plugin lacks CSRF protection when saving its settings, making it possible to exploit the XSS vulnerability through a CSRF attack. The vulnerability has been assigned a CVSS score of 7.1 (High) and is classified under CWE-79 (Cross-site Scripting) and CWE-352 (Cross-Site Request Forgery) (WPScan Report).
When exploited, this vulnerability could allow attackers to inject malicious JavaScript code that would be stored on the server and executed in users' browsers when they view the affected pages. This could lead to theft of sensitive information, session hijacking, or other malicious actions performed in the context of the affected users' sessions (WPScan Report).
As of the last update, there is no known fix available for this vulnerability in the Blue Admin WordPress plugin (WPScan Report).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."