
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-24936 affects the WP Extra File Types WordPress plugin versions before 0.5.1. The vulnerability was discovered by ZhongFu Su(JrXnm) of Wuhan University and was publicly disclosed on December 27, 2021. This security issue involves both Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS) vulnerabilities in the plugin's settings functionality (WPScan).
The vulnerability stems from the absence of CSRF protection when saving plugin settings, combined with inadequate sanitization and escaping of certain input parameters. The technical assessment shows a CVSS v3.1 base score of 8.0 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H. The vulnerability is classified under CWE-352 (Cross-Site Request Forgery) (NVD).
When exploited, this vulnerability could allow attackers to manipulate plugin settings through CSRF attacks and execute stored Cross-Site Scripting attacks. The combination of CSRF and XSS vulnerabilities creates a significant security risk as it could lead to unauthorized changes in plugin settings and potential execution of malicious scripts in the admin context (WPScan).
The vulnerability has been fixed in version 0.5.1 of the WP Extra File Types plugin. Users are strongly advised to update to this version or later to mitigate the security risk (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."