Vulnerabilites related to Unknown - School Management System – WPSchoolPress
CVE-2021-24664 (GCVE-0-2021-24664)
Vulnerability from cvelistv5
Published
2021-11-08 17:34
Modified
2024-08-03 19:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
The School Management System – WPSchoolPress WordPress plugin before 2.1.17 sanitise some fields using sanitize_text_field() but does not escape them before outputting in attributes, resulting in Stored Cross-Site Scripting issues.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | School Management System – WPSchoolPress |
Version: 2.1.17 < 2.1.17 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:42:15.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/3f8e170c-6579-4b1a-a1ac-7d93da17b669" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/164974/WordPress-WPSchoolPress-2.1.16-Cross-Site-Scripting.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "School Management System \u2013 WPSchoolPress", "vendor": "Unknown", "versions": [ { "lessThan": "2.1.17", "status": "affected", "version": "2.1.17", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Davide Taraschi" } ], "descriptions": [ { "lang": "en", "value": "The School Management System \u2013 WPSchoolPress WordPress plugin before 2.1.17 sanitise some fields using sanitize_text_field() but does not escape them before outputting in attributes, resulting in Stored Cross-Site Scripting issues." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-15T19:06:24", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/3f8e170c-6579-4b1a-a1ac-7d93da17b669" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/164974/WordPress-WPSchoolPress-2.1.16-Cross-Site-Scripting.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "WPSchoolPress \u003c 2.1.17 - Multiple Admin+ Stored Cross-Site Scripting", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24664", "STATE": "PUBLIC", "TITLE": "WPSchoolPress \u003c 2.1.17 - Multiple Admin+ Stored Cross-Site Scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "School Management System \u2013 WPSchoolPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2.1.17", "version_value": "2.1.17" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Davide Taraschi" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The School Management System \u2013 WPSchoolPress WordPress plugin before 2.1.17 sanitise some fields using sanitize_text_field() but does not escape them before outputting in attributes, resulting in Stored Cross-Site Scripting issues." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/3f8e170c-6579-4b1a-a1ac-7d93da17b669", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/3f8e170c-6579-4b1a-a1ac-7d93da17b669" }, { "name": "http://packetstormsecurity.com/files/164974/WordPress-WPSchoolPress-2.1.16-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/164974/WordPress-WPSchoolPress-2.1.16-Cross-Site-Scripting.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24664", "datePublished": "2021-11-08T17:34:58", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:42:15.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24575 (GCVE-0-2021-24575)
Vulnerability from cvelistv5
Published
2021-11-08 17:34
Modified
2024-08-03 19:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - SQL Injection
Summary
The School Management System – WPSchoolPress WordPress plugin before 2.1.10 does not properly sanitize or use prepared statements before using POST variable in SQL queries, leading to SQL injection in multiple actions available to various authenticated users, from simple subscribers/students to teachers and above.
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/83c9c3af-9eca-45e0-90d7-edc69e616e6a | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | School Management System – WPSchoolPress |
Version: 2.1.10 < 2.1.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:35:20.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/83c9c3af-9eca-45e0-90d7-edc69e616e6a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "School Management System \u2013 WPSchoolPress", "vendor": "Unknown", "versions": [ { "lessThan": "2.1.10", "status": "affected", "version": "2.1.10", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "JrXnm" } ], "descriptions": [ { "lang": "en", "value": "The School Management System \u2013 WPSchoolPress WordPress plugin before 2.1.10 does not properly sanitize or use prepared statements before using POST variable in SQL queries, leading to SQL injection in multiple actions available to various authenticated users, from simple subscribers/students to teachers and above." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-08T17:34:44", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/83c9c3af-9eca-45e0-90d7-edc69e616e6a" } ], "source": { "discovery": "EXTERNAL" }, "title": "WPSchoolPress \u003c 2.1.10 - Multiple Authenticated SQL Injections", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24575", "STATE": "PUBLIC", "TITLE": "WPSchoolPress \u003c 2.1.10 - Multiple Authenticated SQL Injections" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "School Management System \u2013 WPSchoolPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2.1.10", "version_value": "2.1.10" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "JrXnm" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The School Management System \u2013 WPSchoolPress WordPress plugin before 2.1.10 does not properly sanitize or use prepared statements before using POST variable in SQL queries, leading to SQL injection in multiple actions available to various authenticated users, from simple subscribers/students to teachers and above." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89 SQL Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/83c9c3af-9eca-45e0-90d7-edc69e616e6a", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/83c9c3af-9eca-45e0-90d7-edc69e616e6a" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24575", "datePublished": "2021-11-08T17:34:44", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:35:20.174Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }