![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2021-24177 |
Description: | In the default configuration of the File Manager WordPress plugin before 7.1, a Reflected XSS can occur on the endpoint /wp- admin/admin.php?page=wp_file_manager_properties when a payload is submitted on the User-Agent parameter. The payload is then reflected back on the web application response. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.124738 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-24177 https://wpscan.com/vulnerability/1cf3d256-cf4b-4d1f-9ed8-e2cc6392d8d8 https://n4nj0.github.io/advisories/wordpress-plugin-wp-file-manager-i/ https://n4nj0.github.io/advisories/wordpress-plugin-wp-file-manager-i/ https://plugins.trac.wordpress.org/changeset/2476829/ https://plugins.trac.wordpress.org/changeset/2476829/ |