{"api_version":"1","generated_at":"2026-04-10T20:21:14+00:00","cve":"CVE-2021-24634","urls":{"html":"https://cve.report/CVE-2021-24634","api":"https://cve.report/api/cve/CVE-2021-24634.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-24634","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-24634"},"summary":{"title":"CVE-2021-24634","description":"The Recipe Card Blocks by WPZOOM WordPress plugin before 2.8.3 does not properly sanitise or escape some of the properties of the Recipe Card Block (such as ingredientsLayout, iconSet, steps, ingredients, recipeTitle, or settings), which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2021-09-27 16:15:00","updated_at":"2021-10-04 19:34:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/a49c5a5b-57c0-4801-8bf1-cd3a05b12288","name":"https://wpscan.com/vulnerability/a49c5a5b-57c0-4801-8bf1-cd3a05b12288","refsource":"MISC","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-24634","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24634","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"apple502j","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"24634","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"wpzoom","cpe5":"recipe_card_blocks_for_gutenberg_\\&_elementor","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2021-24634","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Recipe Card Blocks < 2.8.3 - Contributor+ Stored Cross-Site Scripting"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Recipe Card Blocks by WPZOOM","version":{"version_data":[{"version_affected":"<","version_name":"2.8.3","version_value":"2.8.3"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Recipe Card Blocks by WPZOOM WordPress plugin before 2.8.3 does not properly sanitise or escape some of the properties of the Recipe Card Block (such as ingredientsLayout, iconSet, steps, ingredients, recipeTitle, or settings), which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks."}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/a49c5a5b-57c0-4801-8bf1-cd3a05b12288","name":"https://wpscan.com/vulnerability/a49c5a5b-57c0-4801-8bf1-cd3a05b12288"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-79 Cross-site Scripting (XSS)","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"apple502j"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2021-09-27 16:15:00","lastModifiedDate":"2021-10-04 19:34:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:wpzoom:recipe_card_blocks_for_gutenberg_\\&_elementor:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.8.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"24634","Ordinal":"199396","Title":"CVE-2021-24634","CVE":"CVE-2021-24634","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"24634","Ordinal":"1","NoteData":"The Recipe Card Blocks by WPZOOM WordPress plugin before 2.8.3 does not properly sanitise or escape some of the properties of the Recipe Card Block (such as ingredientsLayout, iconSet, steps, ingredients, recipeTitle, or settings), which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"24634","Ordinal":"2","NoteData":"2021-09-27","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"24634","Ordinal":"3","NoteData":"2021-09-27","Type":"Other","Title":"Modified"}]}}}