First published: Mon Mar 14 2022(Updated: )
The Patreon WordPress plugin before 1.8.2 does not sanitise and escape the field "Custom Patreon Page name", which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Patreon Patreon Wordpress | <1.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25026 is a vulnerability in the Patreon WordPress plugin before version 1.8.2 that allows high privilege users to perform Cross-Site Scripting attacks.
CVE-2021-25026 has a severity rating of 5.5, which is considered medium.
CVE-2021-25026 affects the Patreon WordPress plugin before version 1.8.2 by allowing high privilege users to perform Cross-Site Scripting attacks.
To fix CVE-2021-25026, update the Patreon WordPress plugin to version 1.8.2 or later.
You can find more information about CVE-2021-25026 at the following references: [1] [2]