{"api_version":"1","generated_at":"2026-04-25T05:18:45+00:00","cve":"CVE-2021-24618","urls":{"html":"https://cve.report/CVE-2021-24618","api":"https://cve.report/api/cve/CVE-2021-24618.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-24618","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-24618"},"summary":{"title":"CVE-2021-24618","description":"The Donate With QRCode WordPress plugin before 1.4.5 does not sanitise or escape its QRCode Image setting, which result into a Stored Cross-Site Scripting (XSS). Furthermore, the plugin also does not have any CSRF and capability checks in place when saving such setting, allowing any authenticated user (as low as subscriber), or unauthenticated user via a CSRF vector to update them and perform such attack.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2021-09-20 10:15:00","updated_at":"2022-12-20 22:07:00"},"problem_types":["CWE-352","CWE-79"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/d50b801a-16b5-45e9-a465-e3bb0445cb49","name":"https://wpscan.com/vulnerability/d50b801a-16b5-45e9-a465-e3bb0445cb49","refsource":"MISC","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-24618","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24618","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"yangshengcheng@webray.com.cn inc","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"24618","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"wbolt","cpe5":"donate_with_qrcode","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2021-24618","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Donate With QRCode < 1.4.5 - Stored Cross-Site Scripting"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Donate With QRCode","version":{"version_data":[{"version_affected":"<","version_name":"1.4.5","version_value":"1.4.5"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Donate With QRCode WordPress plugin before 1.4.5 does not sanitise or escape its QRCode Image setting, which result into a Stored Cross-Site Scripting (XSS). Furthermore, the plugin also does not have any CSRF and capability checks in place when saving such setting, allowing any authenticated user (as low as subscriber), or unauthenticated user via a CSRF vector to update them and perform such attack."}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/d50b801a-16b5-45e9-a465-e3bb0445cb49","name":"https://wpscan.com/vulnerability/d50b801a-16b5-45e9-a465-e3bb0445cb49"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-79 Cross-site Scripting (XSS)","lang":"eng"}]},{"description":[{"value":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"yangshengcheng@webray.com.cn inc"}],"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-09-20 10:15:00","lastModifiedDate":"2022-12-20 22:07:00","problem_types":["CWE-352","CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:wbolt:donate_with_qrcode:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.4.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"24618","Ordinal":"199380","Title":"CVE-2021-24618","CVE":"CVE-2021-24618","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"24618","Ordinal":"1","NoteData":"The Donate With QRCode WordPress plugin before 1.4.5 does not sanitise or escape its QRCode Image setting, which result into a Stored Cross-Site Scripting (XSS). Furthermore, the plugin also does not have any CSRF and capability checks in place when saving such setting, allowing any authenticated user (as low as subscriber), or unauthenticated user via a CSRF vector to update them and perform such attack.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"24618","Ordinal":"2","NoteData":"2021-09-20","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"24618","Ordinal":"3","NoteData":"2021-09-20","Type":"Other","Title":"Modified"}]}}}