{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T17:04:02.538","vulnerabilities":[{"cve":{"id":"CVE-2021-24405","sourceIdentifier":"contact@wpscan.com","published":"2021-07-06T11:15:09.113","lastModified":"2024-11-21T05:53:00.417","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Easy Cookies Policy WordPress plugin through 1.6.2 is lacking any capability and CSRF check when saving its settings, allowing any authenticated users (such as subscriber) to change them. If users can't register, this can be done through CSRF. Furthermore, the cookie banner setting is not sanitised or validated before being output in all pages of the frontend and the backend settings one, leading to a Stored Cross-Site Scripting issue."},{"lang":"es","value":"El plugin  Easy Cookies Policy de WordPress versiones hasta 1.6.2, carece de cualquier capacidad y comprobación de CSRF a la hora de guardar su configuración, permitiendo que cualquier usuario autenticado (como el suscriptor) pueda cambiarla. Si los usuarios no pueden registrarse, esto puede ser hecho a través de CSRF. Además, la configuración del banner de las cookies no es saneada o comprobada antes de salir en todas las páginas del frontend y en la configuración del backend, conllevando a un problema de tipo Cross-Site Scripting Almacenado"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"contact@wpscan.com","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:izsoft:easy_cookies_policy:*:*:*:*:*:wordpress:*:*","versionEndIncluding":"1.6.2","matchCriteriaId":"BD1B0173-809B-4FD8-8D6C-6F771861AAFB"}]}]}],"references":[{"url":"http://packetstormsecurity.com/files/166543/WordPress-Easy-Cookie-Policy-1.6.2-Cross-Site-Scripting.html","source":"contact@wpscan.com","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"https://wpscan.com/vulnerability/9157d6d2-4bda-4fcd-8192-363a63a51ff5","source":"contact@wpscan.com","tags":["Exploit","Third Party Advisory"]},{"url":"http://packetstormsecurity.com/files/166543/WordPress-Easy-Cookie-Policy-1.6.2-Cross-Site-Scripting.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"https://wpscan.com/vulnerability/9157d6d2-4bda-4fcd-8192-363a63a51ff5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}