CVE-2021-24159
moderate-risk
Published 2021-04-05
Due to the lack of sanitization and lack of nonce protection on the custom CSS feature, an attacker could craft a request to inject malicious JavaScript on a site using the Contact Form 7 Style WordPress plugin through 3.1.9. If an attacker successfully tricked a site’s administrator into clicking a link or attachment, then the request could be sent and the CSS settings would be successfully updated to include malicious JavaScript.
Do I need to act?
-
0.11% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Third Party Advisory
https://wpscan.com/vulnerability/363182f1-9fda-4363-8f6a-be37c4c07aa9
Third Party Advisory
https://www.wordfence.com/blog/2021/02/unpatched-vulnerability-50000-wp-sites-mu...
Third Party Advisory
https://wpscan.com/vulnerability/363182f1-9fda-4363-8f6a-be37c4c07aa9
Third Party Advisory
https://www.wordfence.com/blog/2021/02/unpatched-vulnerability-50000-wp-sites-mu...
35
/ 100
moderate-risk
Severity
30/34 · Critical
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal