{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T07:35:21.419","vulnerabilities":[{"cve":{"id":"CVE-2021-24299","sourceIdentifier":"contact@wpscan.com","published":"2021-05-17T17:15:08.280","lastModified":"2024-11-21T05:52:47.557","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The ReDi Restaurant Reservation WordPress plugin before 21.0426 provides the functionality to let users make restaurant reservations. These reservations are stored and can be listed on an 'Upcoming' page provided by the plugin. An unauthenticated user can fill in the form to make a restaurant reservation. The form to make a restaurant reservation field called 'Comment' does not use proper input validation and can be used to store XSS payloads. The XSS payloads will be executed when the plugin user goes to the 'Upcoming' page, which is an external website https://upcoming.reservationdiary.eu/ loaded in an iframe, and the stored reservation with XSS payload is loaded."},{"lang":"es","value":"El plugin de WordPress para ReDi Restaurant Reservation versiones anteriores al 21.0426, proporciona la funcionalidad para permitir a usuarios hacer reservas en restaurantes.&#xa0;Estas reservas son almacenadas y pueden ser enumeradas en una página de \"Upcoming\" proporcionada por el plugin.&#xa0;Un usuario no autenticado puede completar el formulario para hacer una reserva en un restaurante.&#xa0;El formulario para hacer un campo de reserva de restaurante llamado \"Comment\" no usa la comprobación de entrada apropiada y puede ser usada para almacenar cargas útiles XSS.&#xa0;Las cargas útiles XSS serán ejecutadas cuando el usuario del plugin vaya a la página \"Upcoming\", que es un sitio web externo https://upcoming.reservationdiary.eu/ cargado en un iframe, y es cargado la reserva almacenada con la carga útil XSS"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"contact@wpscan.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:catzsoft:redi_restaurant_reservation:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"21.0426","matchCriteriaId":"62B3EC69-C111-4135-82CE-2944F7518341"}]}]}],"references":[{"url":"http://packetstormsecurity.com/files/162756/WordPress-ReDi-Restaurant-Reservation-21.0307-Cross-Site-Scripting.html","source":"contact@wpscan.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://wpscan.com/vulnerability/fd6ce00b-8c5f-4180-b648-f47b37303670","source":"contact@wpscan.com","tags":["Exploit","Third Party Advisory"]},{"url":"http://packetstormsecurity.com/files/162756/WordPress-ReDi-Restaurant-Reservation-21.0307-Cross-Site-Scripting.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://wpscan.com/vulnerability/fd6ce00b-8c5f-4180-b648-f47b37303670","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}