First published: Mon Apr 12 2021(Updated: )
The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is accessible for user accounts with the ‘manage_options’ privilege (i.e.., only administrators). Unfortunately, one of the parameters used in this AJAX endpoint is not sanitized before being printed back to the user, so the risk it represents is the same as the previous XSS vulnerability.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Patreon Patreon Wordpress | <1.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security issue is CVE-2021-24229.
CVE-2021-24229 has a severity rating of 9.6, which is considered critical.
The affected software by CVE-2021-24229 is the Patreon WordPress plugin before version 1.7.2.
CVE-2021-24229 is classified under CWE-79, which is Cross-Site Scripting (XSS).
To fix CVE-2021-24229, it is recommended to update the Patreon WordPress plugin to version 1.7.2 or later.