The Chameleon CSS WordPress plugin through 1.2 does not have any CSRF and capability checks in all its AJAX calls, allowing any authenticated user, such as subscriber to call them and perform unauthorised actions. One of AJAX call, remove_css, also does not sanitise or escape the css_id POST parameter before using it in a SQL statement, leading to a SQL Injection
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: WPScan
Published: 2021-11-08T17:34:49
Updated: 2024-08-03T19:35:20.305Z
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24626
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-11-08T18:15:08.380
Modified: 2024-11-21T05:53:26.383
Link: CVE-2021-24626
Redhat
No data.