Vulnerability CVE-2021-24626


Published: 2021-11-08

Description:
The Chameleon CSS WordPress plugin through 1.2 does not have any CSRF and capability checks in all its AJAX calls, allowing any authenticated user, such as subscriber to call them and perform unauthorised actions. One of AJAX call, remove_css, also does not sanitise or escape the css_id POST parameter before using it in a SQL statement, leading to a SQL Injection

Type:

CWE-89

(Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'))

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Chameleon css project -> Chameleon css 

 References:
https://codevigilant.com/disclosure/2021/wp-plugin-chameleon-css/
https://wpscan.com/vulnerability/06cb6c14-99b8-45b6-be2e-f4dcca8a4165

Copyright 2024, cxsecurity.com

 

Back to Top