{ "schema_version": "1.4.0", "id": "GHSA-7pfq-9m7r-jmg6", "modified": "2022-05-24T19:19:59Z", "published": "2022-05-24T19:19:59Z", "aliases": [ "CVE-2021-24693" ], "details": "The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the \"File Thumbnail\" post meta before outputting it in some pages, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks. Given the that XSS is triggered even when the Download is in a review state, contributor could make JavaScript code execute in a context of a reviewer such as admin and make them create a rogue admin account, or install a malicious plugin", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-24693" }, { "type": "WEB", "url": "https://wpscan.com/vulnerability/4bb559b7-8dde-4c90-a9a6-d8dcfbea53a7" } ], "database_specific": { "cwe_ids": [ "CWE-79" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-11-08T18:15:00Z" } }