{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T07:27:32.642","vulnerabilities":[{"cve":{"id":"CVE-2021-33849","sourceIdentifier":"disclose@cybersecurityworks.com","published":"2021-10-05T22:15:07.983","lastModified":"2024-11-21T06:09:41.590","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Cross-Site Scripting (XSS) attack can cause arbitrary code (JavaScript) to run in a user’s browser while the browser is connected to a trusted website. The attack targets your application's users and not the application itself while using your application as the attack's vehicle. The XSS payload executes whenever the user changes the form values or deletes a created form in Zoho CRM Lead Magnet Version 1.7.2.4."},{"lang":"es","value":"Un ataque de tipo Cross-Site Scripting (XSS) puede causar una ejecución de código arbitrario (JavaScript) en el navegador de un usuario mientras el navegador está conectado a un sitio web confiable. El ataque se dirige a usuarios de su aplicación y no a la propia aplicación, mientras que usa su aplicación como vehículo del ataque. La carga útil de tipo XSS se ejecuta cada vez que el usuario cambia los valores del formulario o borra un formulario creado en Zoho CRM Lead Magnet Versión 1.7.2.4"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zohocorp:zoho_crm_lead_magnet:1.7.2.4:*:*:*:*:wordpress:*:*","matchCriteriaId":"3D70038F-F229-4A58-AD4A-3DCD91475011"}]}]}],"references":[{"url":"https://cybersecurityworks.com/zerodays/cve-2020-29322-telnet-hardcoded-credentials.html","source":"disclose@cybersecurityworks.com","tags":["Not Applicable"]},{"url":"https://cybersecurityworks.com/zerodays/cve-2021-33849-stored-cross-site-scripting-xss-in-wordpress-plugin-zoho-crm-lead-magnet-version-1-7-2-4.html","source":"disclose@cybersecurityworks.com","tags":["Exploit","Mitigation","Third Party Advisory"]},{"url":"https://cybersecurityworks.com/zerodays/cve-2020-29322-telnet-hardcoded-credentials.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"]},{"url":"https://cybersecurityworks.com/zerodays/cve-2021-33849-stored-cross-site-scripting-xss-in-wordpress-plugin-zoho-crm-lead-magnet-version-1-7-2-4.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mitigation","Third Party Advisory"]}]}}]}