Vulnerabilites related to patreon - patreon_wordpress
Vulnerability from fkie_nvd
Published
2022-03-14 15:15
Modified
2024-11-21 05:54
Severity ?
Summary
The Patreon WordPress plugin before 1.8.2 does not sanitise and escape the field "Custom Patreon Page name", which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
References
▼ | URL | Tags | |
---|---|---|---|
contact@wpscan.com | https://plugins.trac.wordpress.org/changeset/2682069 | Patch, Third Party Advisory | |
contact@wpscan.com | https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://plugins.trac.wordpress.org/changeset/2682069 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
patreon | patreon_wordpress | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "6E377C1A-C923-40C3-B48A-3E51CCBF23B3", "versionEndExcluding": "1.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Patreon WordPress plugin before 1.8.2 does not sanitise and escape the field \"Custom Patreon Page name\", which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed" }, { "lang": "es", "value": "El plugin Patreon de WordPress versiones anteriores a 1.8.2, no sanea y escapa del campo \"Custom Patreon Page name\", lo que podr\u00eda permitir a usuarios con altos privilegios llevar a cabo ataques de tipo Cross-Site Scripting incluso cuando la capacidad unfiltered_html est\u00e1 deshabilitada" } ], "id": "CVE-2021-25026", "lastModified": "2024-11-21T05:54:12.690", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-14T15:15:09.123", "references": [ { "source": "contact@wpscan.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://plugins.trac.wordpress.org/changeset/2682069" }, { "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://plugins.trac.wordpress.org/changeset/2682069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe" } ], "sourceIdentifier": "contact@wpscan.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "contact@wpscan.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-18 23:15
Modified
2024-11-21 08:20
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
Cross-Site Request Forgery (CSRF) vulnerability in Patreon Patreon WordPress.This issue affects Patreon WordPress: from n/a through 1.8.6.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
patreon | patreon_wordpress | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "F913F9B3-3F11-4402-AB3D-35DC2DB2255E", "versionEndIncluding": "1.8.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Patreon Patreon WordPress.This issue affects Patreon WordPress: from n/a through 1.8.6.\n\n" }, { "lang": "es", "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Patreon Patreon WordPress. Este problema afecta a Patreon WordPress: desde n/a hasta 1.8.6." } ], "id": "CVE-2023-41129", "lastModified": "2024-11-21T08:20:38.737", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "audit@patchstack.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-18T23:15:09.187", "references": [ { "source": "audit@patchstack.com", "tags": [ "Third Party Advisory" ], "url": "https://patchstack.com/database/vulnerability/patreon-connect/wordpress-patreon-wordpress-plugin-1-8-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://patchstack.com/database/vulnerability/patreon-connect/wordpress-patreon-wordpress-plugin-1-8-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve" } ], "sourceIdentifier": "audit@patchstack.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "audit@patchstack.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-22 14:15
Modified
2024-11-21 04:02
Severity ?
Summary
The patreon-connect plugin before 1.2.2 for WordPress has Object Injection.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
patreon | patreon_wordpress | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "554260DD-31B2-4ACC-B7F2-0ED0BA7FA7ED", "versionEndExcluding": "1.2.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The patreon-connect plugin before 1.2.2 for WordPress has Object Injection." }, { "lang": "es", "value": "El complemento patreon-connect en versiones anteriores a 1.2.2 para WordPress tiene inyecci\u00f3n de objetos." } ], "id": "CVE-2018-20984", "lastModified": "2024-11-21T04:02:37.523", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-22T14:15:12.493", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://wordpress.org/plugins/patreon-connect/#developers" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://wordpress.org/plugins/patreon-connect/#developers" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-12 14:15
Modified
2024-11-21 05:52
Severity ?
Summary
The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is accessible for user accounts with the ‘manage_options’ privilege (i.e.., only administrators). Unfortunately, one of the parameters used in this AJAX endpoint is not sanitized before being printed back to the user, so the risk it represents is the same as the previous XSS vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
contact@wpscan.com | https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | Exploit, Third Party Advisory | |
contact@wpscan.com | https://wpscan.com/vulnerability/001755c4-add3-4566-a022-ab1f83546c1f | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wpscan.com/vulnerability/001755c4-add3-4566-a022-ab1f83546c1f | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
patreon | patreon_wordpress | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "79EEFCA2-51D1-4B8C-8B01-B826130B6C57", "versionEndExcluding": "1.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is accessible for user accounts with the \u2018manage_options\u2019 privilege (i.e.., only administrators). Unfortunately, one of the parameters used in this AJAX endpoint is not sanitized before being printed back to the user, so the risk it represents is the same as the previous XSS vulnerability." }, { "lang": "es", "value": "El equipo de Jetpack Scan identific\u00f3 una vulnerabilidad de tipo Cross-Site Scripting Reflejado por medio de la acci\u00f3n AJAX patreon_save_attachment_patreon_level del plugin Patreon WordPress versiones anteriores a 1.7.2.\u0026#xa0;Este enlace AJAX es utilizado para actualizar el nivel de compromiso requerido por los suscriptores de Patreon para acceder a un archivo adjunto determinado.\u0026#xa0;Esta acci\u00f3n es accesible para cuentas de usuario con el privilegio \"manage_options\" (es decir, solo administradores).\u0026#xa0;Desafortunadamente, uno de los par\u00e1metros utilizados en este endpoint AJAX no es saneado antes de volver a imprimirse al usuario, por lo que el riesgo que representa es el mismo que el de la vulnerabilidad XSS previo" } ], "id": "CVE-2021-24229", "lastModified": "2024-11-21T05:52:38.627", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-12T14:15:16.100", "references": [ { "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "source": "contact@wpscan.com", "tags": [ "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/001755c4-add3-4566-a022-ab1f83546c1f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/001755c4-add3-4566-a022-ab1f83546c1f" } ], "sourceIdentifier": "contact@wpscan.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "contact@wpscan.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-12 14:15
Modified
2024-11-21 05:52
Severity ?
Summary
The Jetpack Scan team identified a Reflected Cross-Site Scripting in the Login Form of the Patreon WordPress plugin before 1.7.2. The WordPress login form (wp-login.php) is hooked by the plugin and offers to allow users to authenticate on the site using their Patreon account. Unfortunately, some of the error logging logic behind the scene allowed user-controlled input to be reflected on the login page, unsanitized.
References
▼ | URL | Tags | |
---|---|---|---|
contact@wpscan.com | https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | Exploit, Third Party Advisory | |
contact@wpscan.com | https://wpscan.com/vulnerability/7a5fadb1-3f1c-4779-8ff6-356fccb5269b | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wpscan.com/vulnerability/7a5fadb1-3f1c-4779-8ff6-356fccb5269b | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
patreon | patreon_wordpress | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "79EEFCA2-51D1-4B8C-8B01-B826130B6C57", "versionEndExcluding": "1.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Jetpack Scan team identified a Reflected Cross-Site Scripting in the Login Form of the Patreon WordPress plugin before 1.7.2. The WordPress login form (wp-login.php) is hooked by the plugin and offers to allow users to authenticate on the site using their Patreon account. Unfortunately, some of the error logging logic behind the scene allowed user-controlled input to be reflected on the login page, unsanitized." }, { "lang": "es", "value": "El equipo de Jetpack Scan identific\u00f3 una vulnerabilidad de tipo Cross-Site Scripting Reflejado en el Formulario de Inicio de Sesi\u00f3n en el plugin Patreon WordPress versiones anteriores a 1.7.2.\u0026#xa0;El formulario de inicio de sesi\u00f3n de WordPress (wp-login.php) est\u00e1 conectado por el plugin y ofrece permitir a los usuarios autenticarse en el sitio utilizando su cuenta de Patreon.\u0026#xa0;Desafortunadamente, parte de la l\u00f3gica del registro de errores detr\u00e1s de la escena permiti\u00f3 que la entrada controlada por el usuario sea reflejada en la p\u00e1gina de inicio de sesi\u00f3n, sin sanear" } ], "id": "CVE-2021-24228", "lastModified": "2024-11-21T05:52:38.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-12T14:15:16.040", "references": [ { "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "source": "contact@wpscan.com", "tags": [ "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/7a5fadb1-3f1c-4779-8ff6-356fccb5269b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/7a5fadb1-3f1c-4779-8ff6-356fccb5269b" } ], "sourceIdentifier": "contact@wpscan.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "contact@wpscan.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-12 14:15
Modified
2024-11-21 05:52
Severity ?
Summary
The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.
References
▼ | URL | Tags | |
---|---|---|---|
contact@wpscan.com | https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | Exploit, Third Party Advisory | |
contact@wpscan.com | https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
patreon | patreon_wordpress | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "81276AAA-507E-4A2E-91C2-FA7A017066D9", "versionEndExcluding": "1.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies." }, { "lang": "es", "value": "El equipo de Jetpack Scan identific\u00f3 una vulnerabilidad de Divulgaci\u00f3n de Archivos Locales en el plugin Patreon WordPress versiones anteriores a 1.7.0, que podr\u00eda ser abusado por cualquiera que visite el sitio.\u0026#xa0;Con este vector de ataque, un atacante podr\u00eda filtrar archivos internos importantes como wp-config.php, que contiene credenciales de base de datos y claves criptogr\u00e1ficas utilizadas en la generaci\u00f3n de nonces y cookies" } ], "id": "CVE-2021-24227", "lastModified": "2024-11-21T05:52:38.343", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-12T14:15:15.977", "references": [ { "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "source": "contact@wpscan.com", "tags": [ "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016" } ], "sourceIdentifier": "contact@wpscan.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "contact@wpscan.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-12 14:15
Modified
2024-11-21 05:52
Severity ?
Summary
The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content.
References
▼ | URL | Tags | |
---|---|---|---|
contact@wpscan.com | https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | Exploit, Third Party Advisory | |
contact@wpscan.com | https://wpscan.com/vulnerability/2deefa2d-3043-42e5-afef-a42c37703531 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wpscan.com/vulnerability/2deefa2d-3043-42e5-afef-a42c37703531 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
patreon | patreon_wordpress | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "81276AAA-507E-4A2E-91C2-FA7A017066D9", "versionEndExcluding": "1.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim\u2019s account once visited. If exploited, this bug can be used to overwrite the \u201cwp_capabilities\u201d meta, which contains the affected user account\u2019s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content." }, { "lang": "es", "value": "El equipo de Jetpack Scan identific\u00f3 una vulnerabilidad de tipo Cross-Site Request Forgery en el plugin Patreon de WordPress versiones anteriores a 1.7.0, permitiendo a un atacante hacer que un usuario registrado sobrescriba o cree metadatos de usuario arbitrarios en la cuenta de la v\u00edctima una vez visitada.\u0026#xa0;Si se explota, este error se puede utilizar para sobrescribir la meta \"wp_capabilities\", que contiene los roles y privilegios de la cuenta de usuario afectada.\u0026#xa0;Hacer esto esencialmente los bloquear\u00eda fuera del sitio, impidi\u00e9ndoles acceder a contenido pago" } ], "id": "CVE-2021-24230", "lastModified": "2024-11-21T05:52:38.780", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-12T14:15:16.163", "references": [ { "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "source": "contact@wpscan.com", "tags": [ "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/2deefa2d-3043-42e5-afef-a42c37703531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/2deefa2d-3043-42e5-afef-a42c37703531" } ], "sourceIdentifier": "contact@wpscan.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "contact@wpscan.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-12 14:15
Modified
2024-11-21 05:52
Severity ?
Summary
The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged administrator disconnect the site from Patreon by visiting a specially crafted link.
References
▼ | URL | Tags | |
---|---|---|---|
contact@wpscan.com | https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | Exploit, Third Party Advisory | |
contact@wpscan.com | https://wpscan.com/vulnerability/f8ab6855-a319-47ac-82fb-58b181e77500 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wpscan.com/vulnerability/f8ab6855-a319-47ac-82fb-58b181e77500 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
patreon | patreon_wordpress | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "81276AAA-507E-4A2E-91C2-FA7A017066D9", "versionEndExcluding": "1.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged administrator disconnect the site from Patreon by visiting a specially crafted link." }, { "lang": "es", "value": "El equipo de Jetpack Scan identific\u00f3 una vulnerabilidad de tipo Cross-Site Request Forgery en el plugin Patreon de WordPress versiones anteriores a 1.7.0, permitiendo a un atacante hacer que un administrador registrado desconecte el sitio de Patreon al visitar un enlace especialmente dise\u00f1ado" } ], "id": "CVE-2021-24231", "lastModified": "2024-11-21T05:52:38.910", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-12T14:15:16.240", "references": [ { "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "source": "contact@wpscan.com", "tags": [ "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/f8ab6855-a319-47ac-82fb-58b181e77500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/f8ab6855-a319-47ac-82fb-58b181e77500" } ], "sourceIdentifier": "contact@wpscan.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "contact@wpscan.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
CVE-2021-24230 (GCVE-0-2021-24230)
Vulnerability from cvelistv5
Published
2021-04-12 14:06
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content.
References
▼ | URL | Tags |
---|---|---|
https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | x_refsource_MISC | |
https://wpscan.com/vulnerability/2deefa2d-3043-42e5-afef-a42c37703531 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Patreon WordPress |
Version: 1.7.0 < 1.7.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.743Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/2deefa2d-3043-42e5-afef-a42c37703531" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Patreon WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "1.7.0", "status": "affected", "version": "1.7.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas" } ], "descriptions": [ { "lang": "en", "value": "The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim\u2019s account once visited. If exploited, this bug can be used to overwrite the \u201cwp_capabilities\u201d meta, which contains the affected user account\u2019s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-12T14:06:16", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/2deefa2d-3043-42e5-afef-a42c37703531" } ], "source": { "discovery": "UNKNOWN" }, "title": "Patreon WordPress \u003c 1.7.0 - CSRF to Overwrite/Create User Meta", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24230", "STATE": "PUBLIC", "TITLE": "Patreon WordPress \u003c 1.7.0 - CSRF to Overwrite/Create User Meta" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Patreon WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.7.0", "version_value": "1.7.0" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim\u2019s account once visited. If exploited, this bug can be used to overwrite the \u201cwp_capabilities\u201d meta, which contains the affected user account\u2019s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/", "refsource": "MISC", "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "name": "https://wpscan.com/vulnerability/2deefa2d-3043-42e5-afef-a42c37703531", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/2deefa2d-3043-42e5-afef-a42c37703531" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24230", "datePublished": "2021-04-12T14:06:16", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.743Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24228 (GCVE-0-2021-24228)
Vulnerability from cvelistv5
Published
2021-04-12 14:05
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
The Jetpack Scan team identified a Reflected Cross-Site Scripting in the Login Form of the Patreon WordPress plugin before 1.7.2. The WordPress login form (wp-login.php) is hooked by the plugin and offers to allow users to authenticate on the site using their Patreon account. Unfortunately, some of the error logging logic behind the scene allowed user-controlled input to be reflected on the login page, unsanitized.
References
▼ | URL | Tags |
---|---|---|
https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | x_refsource_MISC | |
https://wpscan.com/vulnerability/7a5fadb1-3f1c-4779-8ff6-356fccb5269b | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Patreon WordPress |
Version: 1.7.2 < 1.7.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:19.050Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/7a5fadb1-3f1c-4779-8ff6-356fccb5269b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Patreon WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "1.7.2", "status": "affected", "version": "1.7.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas" } ], "descriptions": [ { "lang": "en", "value": "The Jetpack Scan team identified a Reflected Cross-Site Scripting in the Login Form of the Patreon WordPress plugin before 1.7.2. The WordPress login form (wp-login.php) is hooked by the plugin and offers to allow users to authenticate on the site using their Patreon account. Unfortunately, some of the error logging logic behind the scene allowed user-controlled input to be reflected on the login page, unsanitized." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-12T14:05:35", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/7a5fadb1-3f1c-4779-8ff6-356fccb5269b" } ], "source": { "discovery": "UNKNOWN" }, "title": "Patreon WordPress \u003c 1.7.2 - Reflected XSS on Login Form", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24228", "STATE": "PUBLIC", "TITLE": "Patreon WordPress \u003c 1.7.2 - Reflected XSS on Login Form" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Patreon WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.7.2", "version_value": "1.7.2" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Jetpack Scan team identified a Reflected Cross-Site Scripting in the Login Form of the Patreon WordPress plugin before 1.7.2. The WordPress login form (wp-login.php) is hooked by the plugin and offers to allow users to authenticate on the site using their Patreon account. Unfortunately, some of the error logging logic behind the scene allowed user-controlled input to be reflected on the login page, unsanitized." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/", "refsource": "MISC", "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "name": "https://wpscan.com/vulnerability/7a5fadb1-3f1c-4779-8ff6-356fccb5269b", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/7a5fadb1-3f1c-4779-8ff6-356fccb5269b" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24228", "datePublished": "2021-04-12T14:05:35", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:19.050Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24229 (GCVE-0-2021-24229)
Vulnerability from cvelistv5
Published
2021-04-12 14:05
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is accessible for user accounts with the ‘manage_options’ privilege (i.e.., only administrators). Unfortunately, one of the parameters used in this AJAX endpoint is not sanitized before being printed back to the user, so the risk it represents is the same as the previous XSS vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | x_refsource_MISC | |
https://wpscan.com/vulnerability/001755c4-add3-4566-a022-ab1f83546c1f | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Patreon WordPress |
Version: 1.7.2 < 1.7.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/001755c4-add3-4566-a022-ab1f83546c1f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Patreon WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "1.7.2", "status": "affected", "version": "1.7.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas" } ], "descriptions": [ { "lang": "en", "value": "The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is accessible for user accounts with the \u2018manage_options\u2019 privilege (i.e.., only administrators). Unfortunately, one of the parameters used in this AJAX endpoint is not sanitized before being printed back to the user, so the risk it represents is the same as the previous XSS vulnerability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-12T14:05:46", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/001755c4-add3-4566-a022-ab1f83546c1f" } ], "source": { "discovery": "UNKNOWN" }, "title": "Patreon WordPress \u003c 1.7.2 - Reflected XSS on patreon_save_attachment_patreon_level AJAX action", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24229", "STATE": "PUBLIC", "TITLE": "Patreon WordPress \u003c 1.7.2 - Reflected XSS on patreon_save_attachment_patreon_level AJAX action" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Patreon WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.7.2", "version_value": "1.7.2" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is accessible for user accounts with the \u2018manage_options\u2019 privilege (i.e.., only administrators). Unfortunately, one of the parameters used in this AJAX endpoint is not sanitized before being printed back to the user, so the risk it represents is the same as the previous XSS vulnerability." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/", "refsource": "MISC", "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "name": "https://wpscan.com/vulnerability/001755c4-add3-4566-a022-ab1f83546c1f", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/001755c4-add3-4566-a022-ab1f83546c1f" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24229", "datePublished": "2021-04-12T14:05:46", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-20984 (GCVE-0-2018-20984)
Vulnerability from cvelistv5
Published
2019-08-22 13:29
Modified
2024-08-05 12:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The patreon-connect plugin before 1.2.2 for WordPress has Object Injection.
References
▼ | URL | Tags |
---|---|---|
https://wordpress.org/plugins/patreon-connect/#developers | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:19:26.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wordpress.org/plugins/patreon-connect/#developers" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The patreon-connect plugin before 1.2.2 for WordPress has Object Injection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-22T13:29:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wordpress.org/plugins/patreon-connect/#developers" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20984", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The patreon-connect plugin before 1.2.2 for WordPress has Object Injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://wordpress.org/plugins/patreon-connect/#developers", "refsource": "MISC", "url": "https://wordpress.org/plugins/patreon-connect/#developers" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20984", "datePublished": "2019-08-22T13:29:14", "dateReserved": "2019-08-21T00:00:00", "dateUpdated": "2024-08-05T12:19:26.988Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24231 (GCVE-0-2021-24231)
Vulnerability from cvelistv5
Published
2021-04-12 14:06
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged administrator disconnect the site from Patreon by visiting a specially crafted link.
References
▼ | URL | Tags |
---|---|---|
https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | x_refsource_MISC | |
https://wpscan.com/vulnerability/f8ab6855-a319-47ac-82fb-58b181e77500 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Patreon WordPress |
Version: 1.7.0 < 1.7.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.660Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/f8ab6855-a319-47ac-82fb-58b181e77500" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Patreon WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "1.7.0", "status": "affected", "version": "1.7.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas" } ], "descriptions": [ { "lang": "en", "value": "The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged administrator disconnect the site from Patreon by visiting a specially crafted link." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-12T14:06:31", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/f8ab6855-a319-47ac-82fb-58b181e77500" } ], "source": { "discovery": "UNKNOWN" }, "title": "Patreon WordPress \u003c 1.7.0 - CSRF to Disconnect Sites From Patreon", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24231", "STATE": "PUBLIC", "TITLE": "Patreon WordPress \u003c 1.7.0 - CSRF to Disconnect Sites From Patreon" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Patreon WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.7.0", "version_value": "1.7.0" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged administrator disconnect the site from Patreon by visiting a specially crafted link." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-352 Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/", "refsource": "MISC", "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" }, { "name": "https://wpscan.com/vulnerability/f8ab6855-a319-47ac-82fb-58b181e77500", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/f8ab6855-a319-47ac-82fb-58b181e77500" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24231", "datePublished": "2021-04-12T14:06:31", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.660Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-41129 (GCVE-0-2023-41129)
Vulnerability from cvelistv5
Published
2023-11-18 22:16
Modified
2024-11-20 21:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
Cross-Site Request Forgery (CSRF) vulnerability in Patreon Patreon WordPress.This issue affects Patreon WordPress: from n/a through 1.8.6.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Patreon | Patreon WordPress |
Version: n/a < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.436Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://patchstack.com/database/vulnerability/patreon-connect/wordpress-patreon-wordpress-plugin-1-8-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41129", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T20:05:05.698510Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-20T21:11:30.308Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "packageName": "patreon-connect", "product": "Patreon WordPress", "vendor": "Patreon", "versions": [ { "lessThanOrEqual": "1.8.6", "status": "affected", "version": "n/a", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "BuShiYue (Patchstack Alliance)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Patreon Patreon WordPress.\u003cp\u003eThis issue affects Patreon WordPress: from n/a through 1.8.6.\u003c/p\u003e" } ], "value": "Cross-Site Request Forgery (CSRF) vulnerability in Patreon Patreon WordPress.This issue affects Patreon WordPress: from n/a through 1.8.6.\n\n" } ], "impacts": [ { "capecId": "CAPEC-62", "descriptions": [ { "lang": "en", "value": "CAPEC-62 Cross Site Request Forgery" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-18T22:16:15.050Z", "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", "shortName": "Patchstack" }, "references": [ { "tags": [ "vdb-entry" ], "url": "https://patchstack.com/database/vulnerability/patreon-connect/wordpress-patreon-wordpress-plugin-1-8-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve" } ], "source": { "discovery": "EXTERNAL" }, "title": "WordPress Patreon WordPress Plugin \u003c= 1.8.6 is vulnerable to Cross Site Request Forgery (CSRF)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", "assignerShortName": "Patchstack", "cveId": "CVE-2023-41129", "datePublished": "2023-11-18T22:16:15.050Z", "dateReserved": "2023-08-23T14:29:48.066Z", "dateUpdated": "2024-11-20T21:11:30.308Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-25026 (GCVE-0-2021-25026)
Vulnerability from cvelistv5
Published
2022-03-14 14:41
Modified
2024-08-03 19:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
The Patreon WordPress plugin before 1.8.2 does not sanitise and escape the field "Custom Patreon Page name", which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe | x_refsource_MISC | |
https://plugins.trac.wordpress.org/changeset/2682069 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Patreon WordPress |
Version: 1.8.2 < 1.8.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:49:14.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset/2682069" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Patreon WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "1.8.2", "status": "affected", "version": "1.8.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Jos\u00e9 Aguilera" } ], "descriptions": [ { "lang": "en", "value": "The Patreon WordPress plugin before 1.8.2 does not sanitise and escape the field \"Custom Patreon Page name\", which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-14T14:41:16", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://plugins.trac.wordpress.org/changeset/2682069" } ], "source": { "discovery": "EXTERNAL" }, "title": "Patreon WordPress \u003c 1.8.2 - Admin+ Stored Cross-Site Scripting", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-25026", "STATE": "PUBLIC", "TITLE": "Patreon WordPress \u003c 1.8.2 - Admin+ Stored Cross-Site Scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Patreon WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.8.2", "version_value": "1.8.2" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Jos\u00e9 Aguilera" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Patreon WordPress plugin before 1.8.2 does not sanitise and escape the field \"Custom Patreon Page name\", which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/02756dd3-832a-4846-b9e1-a34f148b5cfe" }, { "name": "https://plugins.trac.wordpress.org/changeset/2682069", "refsource": "CONFIRM", "url": "https://plugins.trac.wordpress.org/changeset/2682069" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-25026", "datePublished": "2022-03-14T14:41:16", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:49:14.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24227 (GCVE-0-2021-24227)
Vulnerability from cvelistv5
Published
2021-04-12 14:05
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Information Exposure
Summary
The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016 | x_refsource_CONFIRM | |
https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Patreon WordPress |
Version: 1.7.0 < 1.7.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.863Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Patreon WordPress", "vendor": "Unknown", "versions": [ { "lessThan": "1.7.0", "status": "affected", "version": "1.7.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas" } ], "descriptions": [ { "lang": "en", "value": "The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-12T14:05:13", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Patreon WordPress \u003c 1.7.0 - Unauthenticated Local File Disclosure", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24227", "STATE": "PUBLIC", "TITLE": "Patreon WordPress \u003c 1.7.0 - Unauthenticated Local File Disclosure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Patreon WordPress", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.7.0", "version_value": "1.7.0" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016" }, { "name": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/", "refsource": "MISC", "url": "https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24227", "datePublished": "2021-04-12T14:05:13", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.863Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }