{"api_version":"1","generated_at":"2026-04-26T13:26:56+00:00","cve":"CVE-2021-24296","urls":{"html":"https://cve.report/CVE-2021-24296","api":"https://cve.report/api/cve/CVE-2021-24296.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-24296","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-24296"},"summary":{"title":"CVE-2021-24296","description":"The WP Customer Reviews WordPress plugin before 3.5.6 did not sanitise some of its settings, allowing high privilege users such as administrators to set XSS payloads in them which will then be triggered in pages where reviews are enabled","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2021-05-24 11:15:00","updated_at":"2021-05-28 18:17:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/c450f54a-3372-49b2-8ad8-68d5cc0dd49e","name":"https://wpscan.com/vulnerability/c450f54a-3372-49b2-8ad8-68d5cc0dd49e","refsource":"CONFIRM","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-24296","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24296","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Truoc Phan from Techlab Corporation","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"24296","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gowebsolutions","cpe5":"wp_customer_reviews","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2021-24296","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"WP Customer Reviews < 3.5.6 - Authenticated Stored Cross-Site Scripting (XSS)"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Go Web Solutions","product":{"product_data":[{"product_name":"WP Customer Reviews","version":{"version_data":[{"version_affected":"<","version_name":"3.5.6","version_value":"3.5.6"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The WP Customer Reviews WordPress plugin before 3.5.6 did not sanitise some of its settings, allowing high privilege users such as administrators to set XSS payloads in them which will then be triggered in pages where reviews are enabled"}]},"references":{"reference_data":[{"refsource":"CONFIRM","url":"https://wpscan.com/vulnerability/c450f54a-3372-49b2-8ad8-68d5cc0dd49e","name":"https://wpscan.com/vulnerability/c450f54a-3372-49b2-8ad8-68d5cc0dd49e"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-79 Cross-site Scripting (XSS)","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Truoc Phan from Techlab Corporation"}],"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-05-24 11:15:00","lastModifiedDate":"2021-05-28 18:17:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.8,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.7,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gowebsolutions:wp_customer_reviews:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"3.5.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"24296","Ordinal":"199058","Title":"CVE-2021-24296","CVE":"CVE-2021-24296","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"24296","Ordinal":"1","NoteData":"The WP Customer Reviews WordPress plugin before 3.5.6 did not sanitise some of its settings, allowing high privilege users such as administrators to set XSS payloads in them which will then be triggered in pages where reviews are enabled","Type":"Description","Title":null},{"CveYear":"2021","CveId":"24296","Ordinal":"2","NoteData":"2021-05-24","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"24296","Ordinal":"3","NoteData":"2021-05-24","Type":"Other","Title":"Modified"}]}}}