{"uuid": "1e844cef-ea6e-4033-8457-cdae37f04dda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-24556", "type": "seen", "source": "https://t.me/cibsecurity/27692", "content": "\u203c CVE-2021-24556 \u203c\n\nThe kento_email_subscriber_ajax AJAX action of the Email Subscriber WordPress plugin through 1.1, does not properly sanitise, validate and escape the submitted subscribe_email and subscribe_name POST parameters, inserting them in the DB and then outputting them back in the Subscriber list (/wp-admin/edit.php?post_type=kes_campaign&amp;page=kento_email_subscriber_list_settings), leading a Stored XSS issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-23T16:23:10.000000Z"}